This command lists all files and directories inside of the one you're currently in.
What is ls?
This Java framework was used to provide easy authentication and authorization.
This european privacy law contains the 'right to be forgotten'
What is GDPR?
It should happen before any changes to the digital system have been made.
This command is used to find specific patterns in a file.
What is grep?
This tool was used to recover 'deleted' files from an image.
What is Foremost (or Autopsy)?
This type of attack is an attempt to get some credentials from a user by impersonating a trusted authority.
What is a phishing attack? (I'll also take social engineering)
What are Confidentiality, Integrity, and Availability?
This tool was used to intercept network requests by establishing a proxy.
Burpsuite (or ZAP)
This firewall filter is configured based on the contents of an incoming network request
What is RBAC? (Role Based Access Control).
What is a DNS? Why would you want to use a different one from default?
DNS = Domain Name System!
An ip is given to every site/service, used to identify your own system.
You want to change it because your ISP can see all the domains you visit by default. Also not all default DNS support encryption.
Where would your hashed passwords be located in a Linux directory?
/etc/shadow
This tool is used to generate free Certificates for websites.
What is Let's Encrypt?
This attack focuses on accessing information by manipulating file paths.
What is path injection?
This security concept states that you should only need the minimum amount of access in order to perform tasks.
What is Principle of Least Privilege?
Certificate not present or expired, outdated cipher suites/cipher suite mismatch, domain/hostname mismatch, CA not trusted
This open-source tool is a database management system.
What is MariaDB?
This OWASP Vulnerability focuses on a system being set up with improper security measures.
What is Security Misconfiguration?
These two types of encryption are used (in order) in a TLS handshake to first exchange keys, and then perform the rest of communication.
What is a pro and a con of implementing multi factor authentication?
Pro:
-More secure
Con:
-Could annoy users, causing insecure behavior
-Is is out of band?