Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
40 Cards in this Set
- Front
- Back
- 3rd side (hint)
CHAP |
Challenge Handshake Authentication Protocol. An authentication protocol periodically reauthenticates. |
Challenge Handshake Authentication Protocol |
|
CER |
Crossover Error Rate. The point at which the FRR and FAR are equal. Sometimes called the equal error rate (ERR) |
Crossover Error Rate |
|
DEP |
Data Execution Prevention. Any technique that prevents a program from running without the user's approval. |
Data Execution Prevention |
|
DLP |
Data Loss Prevention. Software or techniques designed to detect attempts to exfiltrate data. |
Data Loss Prevention |
|
FAR |
False Acceptance Rate. The rate at which a biometric solution allows in individuals it should have rejected. |
False Acceptance Rate |
|
FRR |
False Rejection Rate. The rate at which a biometric solution rejects individuals it should have allowed. |
False Rejection Rate |
|
Federation |
A collection of computer networks that agree on standards of operation, such as security standards. |
|
|
HIDS |
Host-Based Intrusion Detection System |
|
|
HIPS |
Host-Based Intrusion Prevention System |
|
|
Kerberos |
An authentication protocol developed at MIT that uses tickets for authentication. (KDC) |
|
|
Least privileges |
The principle that any user or service will be given only enough access privileges to do its job and no more. |
|
|
NIDS |
Network-based Intrusion Detection System. |
|
|
NIPS |
Network-based Intrusion Prevention System |
|
|
Network scanner |
A tool that enumerates your network and provides a map of the network. |
|
|
OAUTH |
Open Authorization standard. It is a common method for authorizing websites or applications to access information. |
|
|
Protocol analyzer |
Packet sniffer. Allows you to capture a copy of network traffic for analysis. Tcpdump Wireshark |
|
|
Network Scanner |
Finding out and mapping what is on a network. Solar Winds LanHelper |
|
|
Wireless Scanners and Crackers |
Scans wireless and trying to hack them. Aircrack |
|
|
Password Cracker |
Upwdump- exploits SAM file in Windows for hashes. Ophcrack- can be on media and booted into. |
|
|
Vulnerability Scanners |
Scans networks for vulnerabilities. Nessus Netcraft.com Shodan.io Isc.sans.edu MBSA - Microsoft Baseline Security Analyzer. |
|
|
Exploitation Frameworks |
Metasploit |
|
|
PING |
Used to check if an entity is on a network. |
|
|
Netstat |
Displays current network connections. |
|
|
Tracert |
Tells you the entire path to a given address. |
|
|
Nslookup |
Verifies that a machine can connect to the DNS server. Can then be used to get a zone transfer. |
|
|
ARP |
Address Resolution Protocol. Command that maps IP addresses to MAC Addresses. Requires at least one flag. |
|
|
Ipconfig |
Gives you information about your web interfaces. |
|
|
Nmap |
Used to portscan machines. Can find what services are running and maybe the OS. |
|
|
Netcat |
Allows you to read and write to network connections using either TCO or UDP |
|
|
Banner grabbing |
Gathers information about a website before an attack. |
|
|
Banner |
A text file on a web server that describes the operating system and the web server software. |
|
|
LDAP |
Lightweight Directory Access Protocol. Protocol to access directory. |
|
|
TGT |
Ticket granting ticket. Lasts 10 hours, used with a service ticket and KDC to authenticate across multiple resources. |
|
|
KDC |
Key Distribution Center. Used to issue TGTs in Kerberos. |
|
|
RADIUS |
Remote Authentication Dial-In User Service. Allows authentication of remote and other network connections. Centrally manages authorizations. |
|
|
SAML |
Security Assertion Markup Language. Defines security authorizion on web pages. |
|
|
MAC |
Mandatory Access Control. Rigid model where all authentication has to be given for each object. |
|
|
DAC |
Discretionary Access Control. Allows users to share information dynamically. Not very secure. |
|
|
RBAC |
Role-based Access Control. Access is established by what role the user is in. Role-based Access Control. Allows for rules to be placed (allow lists and true deny lists). Often used together for greater flexibility. |
|
|
ABAC |
Attribute-Based Access Control |
Looks at all subjects involved and all their attributes and adjusts accordingly. |