Network
Controls
protocols
Malware Madness
Acronyms
100

A unique numerical identifier assigend to each device on the network

IP address

100

what type of controls are bollards, barricades, and fences

Physical

100

What protocol runs on port 3389 and is it secure =?

remote desktop protocol RDP

100

this malware is commonly found in .docx files 

macro

100

NIST

National Institute of Standards and Technology

200

device that forwards packets between networks

router

200

what is the first layer  of defense in a network

firewall

200

name layer 5 of the OSI model

session

200

this type of malware displays unwanted ads on your system

adware

200

XSS

Cross Site Scripting

300

what model has 7 layers and is used to understand how networks communicate 

OSI model

300
what control is when we only give people access they need 

least privilege access

300

what service runs on port 21

Telnet

300

an infected network of computers 

botnet

300

SPI

Stateful packet inspection 

400

a network that spans a large geographical area 

WAN Wide Area Network

400

a control that ensures users are who they say they are

authentication

400

the protocol is used to access pages on the internet 

HTTP

400

an attack against networks or network services to bring them down

Dos or DDoS

400

CVE

common vulnerability and exploit

500

a network limited to a small geographic area 

Lan local area network

500

the control that assumes no user or device should be automatically trusted

zero trust

500

protocol used to send emails 

SMPT Simple Mail Transfer Protocol

500

malware that hides persistence to avoid detection (super advanced)

rootkit

500

FTP

File Transfer Protocol

M
e
n
u