• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/40

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

40 Cards in this Set

  • Front
  • Back
  • 3rd side (hint)

CHAP

Challenge Handshake Authentication Protocol. An authentication protocol periodically reauthenticates.

Challenge Handshake Authentication Protocol

CER

Crossover Error Rate. The point at which the FRR and FAR are equal. Sometimes called the equal error rate (ERR)

Crossover Error Rate

DEP

Data Execution Prevention. Any technique that prevents a program from running without the user's approval.

Data Execution Prevention

DLP

Data Loss Prevention. Software or techniques designed to detect attempts to exfiltrate data.

Data Loss Prevention

FAR

False Acceptance Rate. The rate at which a biometric solution allows in individuals it should have rejected.

False Acceptance Rate

FRR

False Rejection Rate. The rate at which a biometric solution rejects individuals it should have allowed.

False Rejection Rate

Federation

A collection of computer networks that agree on standards of operation, such as security standards.

HIDS

Host-Based Intrusion Detection System

HIPS

Host-Based Intrusion Prevention System

Kerberos

An authentication protocol developed at MIT that uses tickets for authentication. (KDC)

Least privileges

The principle that any user or service will be given only enough access privileges to do its job and no more.

NIDS

Network-based Intrusion Detection System.

NIPS

Network-based Intrusion Prevention System

Network scanner

A tool that enumerates your network and provides a map of the network.

OAUTH

Open Authorization standard. It is a common method for authorizing websites or applications to access information.

Protocol analyzer

Packet sniffer. Allows you to capture a copy of network traffic for analysis.


Tcpdump


Wireshark

Network Scanner

Finding out and mapping what is on a network.


Solar Winds


LanHelper

Wireless Scanners and Crackers

Scans wireless and trying to hack them. Aircrack

Password Cracker

Upwdump- exploits SAM file in Windows for hashes.


Ophcrack- can be on media and booted into.

Vulnerability Scanners

Scans networks for vulnerabilities.


Nessus


Netcraft.com


Shodan.io


Isc.sans.edu


MBSA - Microsoft Baseline Security Analyzer.

Exploitation Frameworks

Metasploit

PING

Used to check if an entity is on a network.

Netstat

Displays current network connections.

Tracert

Tells you the entire path to a given address.

Nslookup

Verifies that a machine can connect to the DNS server. Can then be used to get a zone transfer.

ARP

Address Resolution Protocol. Command that maps IP addresses to MAC Addresses. Requires at least one flag.

Ipconfig

Gives you information about your web interfaces.

Nmap

Used to portscan machines. Can find what services are running and maybe the OS.

Netcat

Allows you to read and write to network connections using either TCO or UDP

Banner grabbing

Gathers information about a website before an attack.

Banner

A text file on a web server that describes the operating system and the web server software.

LDAP

Lightweight Directory Access Protocol. Protocol to access directory.

TGT

Ticket granting ticket. Lasts 10 hours, used with a service ticket and KDC to authenticate across multiple resources.

KDC

Key Distribution Center. Used to issue TGTs in Kerberos.

RADIUS

Remote Authentication Dial-In User Service. Allows authentication of remote and other network connections. Centrally manages authorizations.

SAML

Security Assertion Markup Language. Defines security authorizion on web pages.

MAC

Mandatory Access Control. Rigid model where all authentication has to be given for each object.

DAC

Discretionary Access Control. Allows users to share information dynamically. Not very secure.

RBAC

Role-based Access Control. Access is established by what role the user is in.


Role-based Access Control. Allows for rules to be placed (allow lists and true deny lists).


Often used together for greater flexibility.

ABAC

Attribute-Based Access Control

Looks at all subjects involved and all their attributes and adjusts accordingly.