This is the unix command you would type to go back one directory.
What is `cd` and what does it do?
This kind of numerical response indicates a server-side error.
What is a 5xx HTTP Response?
This command recursively deletes every file and directory it touches.
What does the command `rm -rf` do?
What is a 3xx HTTP Response?
ForgeRock
What is the project that Michael is currently working on?
The process of finding flaws on the target.
What is vulnerability assessment?
Unlike hashing, this can be converted back into its original format/data.
What is encryption?
The process of finding vulnerabilities on the target.
What is penetration testing?
Risk / Reward
What is the formula for Risk Assessment?
A protocol for mapping an Internet Protocol address (IP address) to a physical machine address that is recognized in the local network.
What is ARP (Address Resolution Protocol)?
The preprogramming of certain tasks (usually via code) so that they can be completed autonomously.
What is automation (in terms of cybersecurity)?
This is a cyberattack that enables hackers to inject malicious client-side scripts into web pages.
What is XSS (Cross Site Scripting)?
This outlines the tasks and procedures that we must adhere to for a client. In addition, if they ask for something outside of our day to day activities, we must consult this before moving forward.
What is the SOW (Statement of Work)?
Regulating password length, complexity, and failed login attempts are a way of preventing this from happening.
What is brute force attempt logins?
One only detects intrusions and the administrator has to take care of preventing the intrusion, while the other detects the intrusion and also takes actions to prevent the intrusion.
What is the difference between IDS (Intrusion Detection System) and IPS (Intrusion Prevention System)?
A tool that shows the path of a packet. It lists all the points (mainly routers) that the packet passes through. This is used mostly when the packet is not reaching its destination.
They are: preparation, identification, containment, eradication, recovery and lessons learned.
What are the six steps of the Incident Response Process?
A system that helps us restrict whom and what accesses our information resources.
What is access control?
This is an encryption signing protocol that requires you to have a key beforehand.
What is RSA?
The organizational process for identifying, authenticating and authorizing individuals or groups of people to have access to applications, systems or networks by associating user rights and restrictions with established identities.
What is identity management?
The intentional or unintentional transmission of data from within the organization to an external unauthorized destination.
What is Data Leakage?
When a properly protected password system receives a new password, it creates a hash value of that password, a random data value, and then the combined value is stored in its database. This helps to defend against dictionary attacks and known hash attacks.
What are salted hashes?
Application Layer
Presentation Layer
Session Layer
Transport Layer
Network Layer
Data Link Layer
Physical Layer
The preemptive gathering of IOC's, viruses, and plans of attack and implementing potential fixes/checking for them within your system.
What is Threat Hunting?
The harsh reality is that this will happen and you must be prepared for when it does.
Will we get hacked?