Threats, Attacks and Vulnerabilities
Technologies and Tools
Architecture and Design
Identity and Access Management
Cryptography and PKI
100

When malware creates a damage on a specific date and time or when specific conditions are met

What is a logic bomb attack?

100

A hardware device or a software solution that inspects and then permits or denies network communications(traffic).

What is a firewall?

100

It is an area at the edge of a network, straddling the internet and the LAN. It is commonly used for public-facing servers and appliances, such as web server for a public-facing website.

What is a DMZ

100

a process that verifies the identity of the subject by comparing one or more factors against a database of valid identities.

What is Authentication

100

an encryption method that rely on a shared secret key. communication parties possess a copy of the shared key and use it to encrypt and decrypt messages.

Symmetric algorithm

200

Gathering publicly available information on social media or public reports.

"Cyber stalk"


 OSINT (Open source intelligence)

200

A tool that allows you to hide data inside other files. Commonly video and picture files are used to hide data.

what is a steganography tool?

200

It conserve IP addresses and to mask the source IP addresses of computers. Without it all users going to the internet would require their own public IP address, which isn’t feasible because of the shortage of public IP addresses.

What is NAT?

200

uses a ticket system for authentication. It offers a single sign-on solution for users and provides protection for logon credentials.

Kerberos

200

Encryption method that relies on a public key and a private key. Communicating parties possess a copy of the public key but only one party possesses the private key.

Asymmetric algorithm

300

 access to a system on a network and be able to gain control.

what is a Pivot point

300

An open-source security scanner tool that you can use it to scan hosts for vulnerabilities, scan for open ports, or fingerprint remote hosts to find out which operating systems they run. 

What is nmap?

300

computer or network that is not connected to the internet or connected to any other devices that are connected to the internet. Also it offer maximum security for the most sensitive workloads.

What are the Air gap

300

A system that centralizes authentication for remote

connections. It is typically used when an organization has more than one remote access server.

RADIUS

300

A mathematical algorithm that maps data of arbitrary size to a random value of a fixed size. The purpose is to be a one-way function, infeasible to invert.

What is Hashing?

400

an event that occurs when a process produces an unexpected result due to timing.

What is a race condition attack?

400

When data is removed from a corporate device without authorization.

What is Data Exfiltration?

400

are placed in front of services or servers. they ensure that requests for the website are evenly balanced between all the web servers.

Load balancers

400

An access control model that uses roles or groups, which are typically identified by job functions. Instead of assigning permissions directly to users, user accounts are placed in roles and administrators assign privileges to the roles.

RBAC

400

Random data that is used as an additional input to a one-way function that hashes data. It helps preventing against dictionary attacks.

What is Salting?

500

When the tester has no knowledge of the target system and is not provided with any additional information about the organization, architecture. The tester relies heavily on public-facing resources and information.

What is black black box testing?

500

It centralizes your event and access logs and other activities. It also correlates events to give you a big picture of what happened. It generates alerts based on triggers in near real time.

What does SIEM do?

500

enables you to segment networks logically but devices are connected to the same switches and use the same routers and firewalls.

VLAN?

500

a ration of unauthenticated valid users to valid authentications.

What is FRR? (False Rejection Rate)

500

Algorithms to provide proof that a message originated from a particular sender and to ensure that the message was not modified while in transit between the sender and the recipient. These algorithms rely on a combination of public key cryptography and hashing functions.

Digital Signature.