Concepts
The access to data being restricted to those who need to know.
What is confidentiality?
A weakness in software, hardware, or personnel.
What is a vulnerability?
Allows setting permissions based on a user's role in an organization.
What is RBAC?
It aims to disrupt the availability of a service.
What does DoS represent?
stands for Security Information and Event Management.
What is SIEM?
An example of something you know in authentication factors
Encrypts data and demands payment for restoration access.
What is ransomware?
data ensured to be accurate and trustworthy.
What is integrity?
This applies a severity and score to vulnerabilities.
What is CVSS?
Restricts user access to only what they need for their job functions.
What is limited privilege?
This uses multiple systems to shut down a server.
What is a DDoS attack?
Used to monitor and control network devices.
What is SNMP?
Enhances security by requiring more than one verification method.
What is multi-factor authentication?
Use commonly used passwords from a list to gain unauthorized access.
What are dictionary attacks?
Data accessed by the right people when needed.
What is availability?
When no known patch exists for a vulnerability.
What is a zero-day attack?
An example of physical network control
What is a CCTV camera?
Attempts to gain sensitive information through electronic communication.
What is phishing?
Alerts notify the IT team when metrics are outside acceptable ranges
What is SIEM notifications?
Extensible Authentication Protocol in network security contexts.
What is EAP?
Occurs when an attacker positions themselves between a user and their destination.
What is an on-path attack?
This is used to ensure data integrity.
What is a digital signature?
A tool used to attack a vulnerability, commonly in software or code.
What is an exploit?
Applied to operations susceptible to fraud or abuse.
What is separation of duties?
An access point mimics another wireless access point's SSID and password.
What is an evil twin?
Identifies risks to the organization's network.
What is a vulnerability assessment?
Centralizes authentication for devices logging into networks using protocols like 802.1X.
What is Radius?
Records keystrokes, capturing sensitive information without user knowledge.
What is a keylogger?
Individuals granted access to the network for a specific purpose
Who are contractors?
Malicious users who take advantage of network vulnerabilities
What are internal threats?
The concept that limits user access and permissions to only what they need for their job functions
What is least privilege?
Uses commonly used words/passwords from a list for unauthorized access attempts.
What are dictionary attacks?
Analyze logs from applications, devices, and security events for comprehensive monitoring.
What are SIEM systems?
The method that allows users to authenticate without entering credentials each time they access resources
What is Single Sign-On (SSO)?
Has the same SSID and password as another wireless access point, posing security risks to users connecting unknowingly.
What is an evil twin AP?