This NIST control family focuses on verifying identities before granting access to systems.
What is Identification and Authentication (IA)?
This type of Nessus scan checks for vulnerabilities without logging into the target system, relying only on external visibility.
What is a non-credentialed (unauthenticated) scan?
This language is used in Splunk to search, filter, and analyze log data.
What is SPL (Search Processing Language)?
This is the minimum retention period for audit records, defined as either one year or one inspection cycle (such as a Defense Counterintelligence and Security Agency (DCSA) Security Review), whichever is longer.
What is one year or one inspection cycle, whichever is longer?
This system for sharing documents over the internet was created by Tim Berners-Lee in 1989 while working at CERN.
What is the World Wide Web?
This control family ensures users only get the permissions they need to do their jobs.
What is Access Control (AC)?
Nessus scans systems for these known security issues, often tracked in databases like CVE.
What are vulnerabilities?
This Splunk component is responsible for collecting and forwarding data from source systems to indexers.
What is a forwarder (universal forwarder)?
In Cyber, this term is defined as security posture analysis and assessments conducted at a frequency sufficient to support risk-based decisions and ensure adequate protection of data holdings.
What is continuous monitoring?
This 1970s relational database language, developed at IBM, became the foundation for modern database querying.
What is SQL?
This NIST control family is responsible for tracking and recording system activity for security analysis.
What is Audit and Accountability (AU)?
This mode of scanning in Nessus requires login credentials to perform deeper analysis of a system.
What is a credentialed scan?
This Splunk component stores and indexes incoming data, making it searchable.
What is an indexer?
These Defense Information Systems Agency guidelines are used to configure RAY classified information systems to prevent unauthorized and unintended data transfer via shared system resources.
What is Security Technical Implementation Guides (STIG)?
This 1983 home console helped revive the video game industry after the crash of 1983.
What is the Nintendo Entertainment System?
This control focuses on protecting data confidentiality and integrity through encryption methods.
What is System and Communications Protection (SC)?
This scoring system, often shown in Nessus results, provides a standardized way to measure vulnerability severity from 0.0 to 10.0.
What is CVSS (Common Vulnerability Scoring System)?
This command in SPL is used to transform events into statistical tables, often used with functions like count, avg, or sum.
What is stats?
Global Security Services (GSS) Cybersecurity will develop and maintain this plan for each classified information systems to track and monitor identified deficiencies.
What is a POA&M?
This handheld electronic organizer helped define early mobile productivity before smartphones.
What is the PalmPilot?
This control family includes processes for identifying, reporting, and responding to cybersecurity incidents.
What is Incident Response (IR)?
In Nessus, each vulnerability check is implemented as one of these uniquely identified components, often referenced by a numeric ID.
What is a plugin?
This type of Splunk file, often in CSV format, is used to enrich search results by mapping fields to additional data.
What is a lookup table?
This role reviews and confirms any ongoing operational need for an individual to maintain continued system access.
What is the PM/ISO?
This early messaging device became iconic for physical keyboards and push email before smartphones dominated.
What is the BlackBerry?