The 3 share permissions
What is Read, Change, Full Control?
A merchant using credit cards must abide by this.
What is PCI DSS?
A threat actor motivated by their own morals and feelings.
What is a hactivist?
The control that covers what someone can do or not do.
What is authorization?
Locating information through open, free, public access
What is OSINT?
Joe has Full Control Share, and Read, Write, Execute and List NTFS permissions. What are his effective permissions?
A company that offers financing on their services uses this.
What is GLBA (Grahm, Leach Bliley Act)
Malware typically embedded in executable files
What is a trojan?
Authentication based on the way you walk.
What is Gait analysis (part of Biometrics)
Your team will attempt to penetrate the network.
What is red team?
A hidden share called Payroll is created like this
Payroll$
Illegally reading someone's email violates this
What is the ECPA (Electronic Communication Privacy Act)
A threat located in an excel spreadsheet.
What is a macro virus?
When you restrict a user from using the network after 6pm and on weekends.
What is Rule based Access Control.
Vulnerabilities are ranked with this
What is a CVE?
Net result of permissions
What are effective permissions?
Federal government agencies must file incident reports annually under this act?
What is FISMA (Federal Information Security Management Act)
Type of threat that secretly lingers without detection.
What is an APT? (Advanced Persistent Threat)
No personal feelings or decisions in controlling who has access to documents with this model.
What is MAC - Mandatory Access Control?
Local Windows login uses this authentication method
What is NTLM?
The 2 specific permissions you get with Full Control
The specific HIPAA rule that covers electronic health records
Privacy Rule
This attack exploits the concept of Intimidation
What is Social Engineering?
Term that describes the point of false acceptances and false rejections in biometric systems.
In SIEM event log data is automated from the hosts. This process is known as:
What is log aggregation?