CompTIA SY0-601 Security+ Exam Vocabulary (Section 1: Attacks, Threats, and Vulnerabilities)

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

ZIP Bomb

A 42 KB .zip compressed file that extracts into 4.5 Petabytes (4,500 TB) worth of data. Of course, this leads to resource exhaustion.

Blue Team

A Security Team group. Defensive; protecting the data. They do operational security and control incident response. They hunt for threats, to find and fix holes.

White Team

A Security Team group. Not on a team, they administer the interactions between red and blue, enforcing the rules and resolving any issues. They also manage post-event assessments.

Red Team

A Security Team group. Offensive; they are the hired attackers that ethically try to hack and exploit vulnerabilities to find them and patch them.

Purple Team

A Security Team group. Red and blue teams working together, cooperating instead of competing. They give feedback to each other based on results.

Refactoring

A driver manipulation method. Developers rewrite the code without changing the driver's behavior.

Shimming

A driver manipulation method. It uses additional code to modify the behavior of a driver. This is often done for backwards compatibility, like for Windows. This can be abused by attackers.

Typosquatting

A form of URL hijacking that relies on mistakes when typing a link. ex: https://professormessor.com

Prepending

A form of URL hijacking that relies on someone overlooking the link when they click on it or see an email from the domain. ex: https://pproffessormesser.com

On Premises Security

A form of security against attacks, through the client. Positives: + Customize your security posture (you have full control). + On-site team can manage security better. + Local team manages uptime and availability. Negatives: -A local team may be expensive and difficult to staff. -Security changes can take time.

Cloud-Based Security

A form of security against attacks, through the cloud. Positives: + data in a secure environment + providers are managing large-scale security + limited downtime + scalable security options + less expensive Negatives: - third party may have access - users must follow security best practices - not as customizable as necessary

Trojan Horse

A malware that pretends to be something else, so it can take over your computer. Once it's inside, it has free reign.

Crypto-ransomware

A more powerful malware that encrypts your information and slowly deletes it, unless you decide to pay up to get it unencrypted and saved.

Botnets

A network of bots that work together for a common goal, often causing a DDoS. They are often rented by hackers.

Spraying Attack

A password attack where attackers test the most common passwords to see if the user has one of them. This is often taken from the top 3 passwords on the list.

Radio Frequency Jamming

A person or a device intentionally or unintentionally interferes with your wireless network transmissions. The receiving device cannot get a solid connection to the network. This may be caused by microwave ovens and fluorescent lights (assuming it was accidental).

Spear Phishing

A phishing attack targeting a specific user, often one with a lot of information or access to money (like a CEO/CFO).

Pharming

A redirection/reroute from a legitimate site to a bogus site. Usually done through vulnerabilities on the original site.

Resource Exhaustion

A situation in which a hardware device with limited resources (CPU, memory, file system storage, etc.) is exploited by an attacker who intentionally tries to consume more resources than intended. This is often targeted on purpose and leads to a crash/DDoS.

Influence Campaign

A sway of public opinion on political and social issues. They aim to manipulate people's thinking in a certain area.

Buffer Overflow

A technique for crashing by sending too much data to the buffer in a computer's memory, causing it to overflow, spilling into other memory areas.

Hoax

A threat that doesn't actually exists. Wastes a lot of time and resources. (usually emails, social media posts, etc.)

Social Media Attack Vectors

A type of Attack Vector. Attackers can use the information that you post online (where you are and when, vacation pictures are a big part).

Supply Chain Attack Vectors

A type of Attack Vector. Corporations usually buy things from a third party, these can be tampered with on every step of the way.

Email Attack Vectors

A type of Attack Vector. Done through phishing or delivering malware through email. Sent to a potential victim.

Direct Access Attack Vectors

A type of Attack Vector. Involves physical access to a system, which is why they are usually locked up (to prevent this).

Cloud Attack Vectors

A type of Attack Vector. Involves publicly facing applications and services. They may be attacked and become vulnerable points.

Wireless Attack Vectors

A type of Attack Vector. Takes advantage of access points that may not be secure. Watch out for Rogue Access Points and Evil Twins.

Removable Media Attack Vectors

A type of Attack Vector. They can get around a firewall or other existing security. They could connect something that allows them to transfer data out. One example of this is malicious software on USB flash drives that can infect anything that it is plugged into.

Unauthorized Hackers

A type of Threat Actor & Hacker. These hackers are malicious and aim for personal gain. (ex. money, information, both, etc.)

Authorized Hackers

A type of Threat Actor & Hacker. They are hackers that are ethical with good intentions, and have permission to hack.

Semi-Authorized Hackers

A type of Threat Actor and Hacker. These hackers find a vulnerability (and aren't permitted to), but they don't use it. They may be more of a "researcher."

Shadow IT

A type of Threat Actor. Computer hardware, software, or services used on a private network without authorization from the system owner. Always done internally, and isn't stopped by some roadblocks.

Competitors

A type of Threat Actor. People who are against your company, basically. They are very sophisticated, and have significant funding. They have a variety of intentions, though -- stealing customer lists, taking financial information, and more. Or they might not do anything; they just have the potential to act on vulnerabilities.

Nation States

A type of Threat Actor. Smaller governments that could potentially band together to "hack" or attack something.

Insiders

A type of Threat Actor. Someone who is "inside" an institution, they may plan to attack it. The insider has inside knowledge, and attacks can be directed at vulnerable systems since they know what to hit.

Hacktivist

A type of Threat Actor. They are hackers with a purpose, they may want social change or a political agenda. They are often external. Hacks are usually sophisticated, and are very specific.

Organized Crime

A type of Threat Actor. They are professionals, motivated by money and almost always an external entity. They are very sophisticated and organized: one person hacks, one person manages exploits, another person sells the data, etc.

Script Kiddies

A type of Threat Actor. They run pre-made scripts to see if one of them functions to hack into the system. This can be external or internal.

Dark Web Intelligence

A type of Threat Intelligence. Accessing this area of the Internet is very difficult, yet a lot of information can be found there, often being the information of hacker groups and services (like what they do, their tools, what they are selling, etc).

Vulnerability Databases

A type of Threat Intelligence. Researchers find vulnerabilities and put it into this, allowing everyone to see it. It is a huge list of vulnerabilities, basically. -Some examples of this are the Common Vulnerabilities and Exposures (CVE) list, and the U.S National Vulnerability Database (NVD).

Predictive Analysis

A type of Threat Intelligence. The analyzation of data quickly to find suspicious patterns and behaviors to indicate potential attacks.

Closed Intelligence

A type of Threat Intelligence. This intelligence was compiled by someone else, and is unavailable to the public. However, it can be purchased.

File/Code Repositories

A type of Threat Intelligence. This may contain a public program that is used to hack into a computer. See what's published, and defend against it.

Local Industry Groups for Threat Research

A type of Threat Research. A gathering of local peers in the industry that may discuss local challenges and the securing of specific technologies.

Academic Journals Threat Research

A type of Threat Research. A very credible book that keeps up with the latest attack methods, often being very detailed and written by a professional.

Vulnerability Feeds for Threat Research

A type of Threat Research. Data supplied to vulnerability scan software that provides information about the latest vulnerabilities, often through notifications.

Social Media and Threat Research

A type of Threat Research. Hacking groups on here can be monitored, revealing potential exploit attempts.

Vendor Websites for Threat Research

A type of Threat Research. On this type of website, you can see if a vendor discovers a new vulnerability in their software; they know their software best, of course.

Conferences for Threat Research

A type of Threat Research. These may involve people meeting up to discuss potential security concerns and vulnerabilities, maybe even being an "early warning" of sorts.

Zero-Day Attack Vulnerability

A type of Vulnerability. An undiscovered vulnerability, which people work hard to find. They are important since it's hard to find something that isn't known about yet.

Error Vulnerability

A type of Vulnerability. Error messages can give a LOT to a hackers -- like service type, version information, and debug data. Obscure errors are needed. Ex: <code error> VS "This website failed to open the page."

Default Settings Vulnerability

A type of Vulnerability. Every device has a default login, hackers may attempt it to abuse it. Can be abused through Botnets at a massive speed.

Improper Patch Management Vulnerability

A type of Vulnerability. Happens if a patch is not applied properly. Make sure it IS so this is prevented.

Open Ports and Services Vulnerability

A type of Vulnerability. Make sure to manage access to ports that are opened by services/applications.

Open Permissions Vulnerability

A type of Vulnerability. Permissions are accidently left open, allowing too many people to access things (like cloud storage). Be sure to secure this!

Insecure Protocols Vulnerability

A type of Vulnerability. Some Protocols may not be encrypted; and traffic is sent in the clear. Make sure to not do this, and to use encryption if it is vital information.

Weak Encryption Vulnerability

A type of Vulnerability. Some encryption types are not secure enough in order to be safe. Updated encryption should be used instead, like WEP/WPA and more. Bad encryption would be ones with less than 128-bit key sizes, outdated hashes, and more.

Legacy Platform Vulnerability

A type of Vulnerability. The use of an older or outdated device which is installed still on the network. There may be a lot of easy access points within these due to the age of the technology. Either replace them, or protect them with firewalls and other safety methods.

Unsecured Root Accounts Vulnerability

A type of Vulnerability. This is where the main accounts, or "administrator" accounts, are hacked initially due to an easy-to-hack password. These need to be protected and also limited to only 1-2 accounts in a company.

Intrusive Scan

A type of scan. Finding a vulnerability and trying to exploit it.

Non-Intrusive Scan

A type of scan. Gathering information without attempting to exploit a vulnerability.

Non-Credentialed Scans

A type of scan. The scanner cannot log into the remote device.

Credential Scan

A type of scan. The scanner has access to the device; it can mimic an insider attack.

Race Conditions

A vulnerability that occurs when an ordered or timed set of processes is disrupted or altered by an exploit. Sometimes, things happen at the same time, which can be bad if you haven't planned for it. This can lead to devastating outcomes.

Vulnerabilities

A way for an attacker to get into a computer. There are many types of attacks.

APT

Advanced Persistent Threat. A type of Threat Actor. Attackers are in the network, undetected, and are persistent there until taken out.

NFC Attack

An attack against mobile devices that use Near Field Communication. Near Field Communication is a group of standards that allow mobile devices to communicate with nearby mobile devices.

Domain Hijacking

An attack that changes the registration of a domain name without permission from the owner. They may also just gain access to it. The attacker then gains access to where traffic flows.

SSL Stripping

An attack that focuses on stripping the security from HTTPS-enabled websites. Combines an on-path attack with a downgrade attack. Attackers must sit in the middle of the conversation, modifying data between the victim and the web server. The victim cannot easily see a problem. Relate to the SSL and TLS protocols.

MAC Flooding

An attack that sends numerous packets to a switch, each of which has a different source MAC address, in an attempt to use up the memory on the switch. If this is successful, the switch will change state to failopen mode, and memory will flow in many other places.

Bluejacking

An attack that sends unsolicited messages to Bluetooth-enabled devices. Think of an hijack. It was patched.

DNS Poisoning

An attack that substitutes DNS addresses so that the computer is automatically redirected to an attacker's device or website of their choice.

Directory Traversal

An attack that takes advantage of a vulnerability so that a user can move from the root directory to restricted directories. Ex: users shouldn't be able to browse the Window's folder.

Brute Force Attack

An attacker can use this attacking method by trying every possible password combination to get a hash result. This might take a lot of time. (They would start with 'aaaaa')

API Attacks

Application Programming Interface Attacks. Attackers look for vulnerabilities in this new communication path (it may expose sensitive information, DoS, privileged access, etc)

AI

Artificial Intelligence. Machines are getting smarter. They can identify patterns in data and improve predictions. This requires a lot of training data, but is very useful. Yet, it can be manipulated and confused to accidently give vital information.

Session Hijacking

Attacker gains access to the session ID and can send it to the server to gain access to the victim's account. Nothing else is needed. This can be obtained through the victim's cookies and other ways.

Credential Harvesting

Attackers collect login credentials; many ways to do this.

RFID Attack

Attacks against Radio-Frequency Identification systems. Some common attacks are eavesdropping, replay, and DoS. This technology is normally used for radar technology.

AIS

Automated Indicator Sharing. A type of Threat Intelligence. Basically indicates how to safely transfer information. Done through The Structured Information Expression (STIX).

Cross-Site Request

Browser loads information from multiple servers. Example: One server loads the words, another loads a YouTube video, another a picture, and others. This is normal, yet can be abused.

Backdoors

Created by some Malwares when it is installed. It installs a program that opens a "back door" to make it easier to get back into the system. Other Malware can use this backdoor.

XSRF

Cross-Site Request Forgery. Often known as "one-click attacks", it takes advantage of the trust that a web application has for the user. The web site trusts your browser, and requests can be made without your consent or knowledge.

XSS

Cross-site scripting. Called this due to browser security flaws (information from one site could be shared to another). One of the most common web application development errors, taking advantage of the trust a user has for a site Persistent: Attacker posts a message to a social network that includes the "malicious payload". It is now "persistent" -- everyone gets the malicious script when they view it. It does not have a specific target. This can spread quickly on social media. Non-persistent: Web site allows scripts to run in user input (search bar), attacker emails a link that can take advantage of this vulnerability, running a script that steals information. They can use the information (session IDS, cookies) to steal the user's information sneakily.

DoS

Denial of Service. Forcing the service to fail, usually by overloading it. It often takes advantage of a design flaw or vulnerability.

DDoS

Distributed Denial of Service. An army of computers is launched to bring down a service, by using all of the bandwidth or resources, creating a traffic spike. This is what botnets are used for, as the bots would make a coordinated attack.

On-Path Attack

Formerly known as "man in the middle" where the attacker redirects the victims traffic without there knowledge. They can intercept this traffic and send it back.

Privilege Escalation

Gaining a higher-level access to a system using a vulnerability or bug/design flaw. The higher the access, the more capable the attackers are to cause damage. This is a high-priority vulnerability.

Working Knowledge

How much is known about a penetration test. For example, what environment is it in? Unknown? Known? Partially known?

Bots

If your computer is infected, it becomes this. Can be put on your computer from a Trojan Horse or an application vulnerability. It is controlled through a Command and Control center, and otherwise just waits.

Wireless Disassociation Attack

In this attack, connections usually go from working to not working, then working again, and so on. Wireless deauthentication is what this is, and it is a significant wireless denial of service (DoS) attack.

Replay Attack

In this attack, when the client sends information, the attacker and hacker can both get it. Then the attacker sends their own request using their information, gaining access to the valid account.

Intelligence Fusion

In threat hunting, using sources of threat intelligence data to automate detection of adversary IoCs and TTPs.

IOC

Indicators of Compromise. A type of Threat Intelligence. An event that indicates an intrusion, like an unusual amount of network activity, or a change to file hash values (showing the modification of files) and more.

Cookies

Information stored on your computer by the browser. This is used for tracking, personalization, session management, etc. It usually isn't a security risk unless someone accesses them, as they contain a lot of personal data. Session IDs are often stored there.

Downgrade Attack

Instead of using perfectly good encryption, systems are forced to use something that's not great. This creates a vulnerability.

Injection Attack

Involves "adding" something that does not belong. Usually involves adding your own code stream or otherwise due to a vulnerability.

Threat Intelligence

Involves having knowledge about threats. May involve collecting and researching information/data to stay informed.

Rainbow Tables

Large pre-generated data sets of encrypted passwords (from hashing) that is used in password attacks. Different tables would be needed for different hashing methods.

Malware

Malicious software which aims to do harm to your computer or your information. There are many, MANY methods of doing this. They often work together.

Viruses

Malware that can reproduce itself. They can "infect" many files and damage them. Thousands of new ones are made every week.

Ransomware

Malware that makes often fake threats to cause action. There are more extreme versions of this, however.

Rootkits

Malware that modifies the kernel of the OS to avoid being detected by antivirus/anti-malware. Often combined with other malware. Its invisible to the OS, Task Manager, and an antivirus/anti-malware

Worms

Malware that self-replicates. It uses the network as a transmission medium, spreading very quickly and easily. It can take over thousands of devices by itself, and cannot easily be stopped once inside the network.

Spyware

Malware that spies on you, taking your information for advertising identity theft, and affiliate fraud. May also include browser monitoring with keylogging and otherwise.

Malicious Hardware

May include USBs and flash drives. Do not plug in an unknown piece of hardware into your computer, as it might turn out to be this. It can infect the computer with malware through many methods.

Plaintext

Normal text that has not been encrypted. Storing passwords like this is a terrible idea.

Logic Bombs

Often planted to wait for a predefined event. This can be a time or date, or a user event. It is difficult to identify, but also difficult to recover if it explodes. These are usually installed by malware, and they can delete storage and master boot records.

OSINT

Open-Source Intelligence. A type of Threat Intelligence. Publicly available and a good place to start searching. Includes the Internet and governmental/commercial data.

PUPs

Potentially Unwanted Programs. Identified by anti-virus and is usually installed with other software.

Salt

Random data added to a password when hashing. Every user gets their own amount of salt. This makes it harder, if not impossible, to use Rainbow Tables to crack a hash.

Supply Chain Order

Raw materials -> Suppliers -> Manufacturers -> Distributors -> Customers -> Consumers

URL Hijacking

Relies on mistakes in the URL to make a user go to a phishing site. Includes Typosquatting, Prepending, and more.

RATs

Remote Access Trojans. The ultimate backdoor, malware installs the server/service/host, and attackers can connect to it with the client software. They basically gain access to a device and can keylog, screen record, copy files, and more.

RFCs Threat Research

Requests for Comments. A type of Threat Research. They analyze threats, being published by the Internet Society (ISOC) and written by the Internet Engineering Task Force (IETF).

Smishing

SMS/text phishing

SIEM

Security Information and Event Management. The logging of security events and information. Data from different sources may be able to be correlated, linking diverse data types. Additionally, forensic analysis can be done after a security breach happens.

SOAR

Security Orchestration, Automation, Response. Involves keeping information safe.

SSRF

Server-Side Request Forgery. Attacker can find a vulnerability in a web application, send requests to a web server, and perform the request on behalf of the attacker. Often caused by bad programming.

MAC Cloning

Setting the MAC address of your PC or any other MAC address as your device WAN port. Attackers can use this by setting their MAC address to match the address of an existing device. This allows them to circumvent filters.

Shoulder Surfing

Simply looking over someone's shoulder to obtain any information on the computer. This could include vital information, depending on what the victim is doing.

Pretexting

Social engineering; lying to get information. The attacker creates a situation and puts themselves into it.

Impersonation

Social engineering; pretending to be someone who you are not. For example, an attacker may forge an email from Microsoft commenting on concerns with a user's computer. Tricking someone with this may cause them to give away more information.

Improper Input Handling

Software that allows the user to enter data but does not validate or filter user input to prevent a malicious action. An attacker could type a line of code to make the website do something unintended.

Adware

Software that displays advertisements. Often installed with other software (a PUP). It may cause issues with performance. Not really malware; it doesn't try to harm your computer, at least on the surface.

Improper Error Handling

Software that does not properly trap an error condition and provides an attacker with underlying access to the system. Errors should not have a lot of detail to prevent this.

Skimming

Stealing credit card information, usually during a normal transaction (with cameras, card readers, or human eyes). People can copy data from the card, such as the number, expiration date, your name, and more. Attackers can use this information for other transactions.

STIX

Structured Information Expression. A type of Threat Intelligence. Describes cyber threat information and includes motivations, abilities, capabilities, and response information. Securely shared by The Trusted Automated Exchange of Indicator Information (TAXII).

TTP with Threat Research

Tactics, Techniques and Procedures. A type of Threat Research. What are adversaries doing, and how are they doing it? Search through data and networks and look for threats.

Hashing

Takes a password and basically turns it into a "fingerprint". It cannot be reversed, making it a common way to store passwords.

Security Teams

Teams may be put together to work and secure a system, involving many different skills (such as operational security, penetration testing, exploit research, etc).

Penetration Testing

Testing if your security can be penetrated through; basically simulates an attack. Similar to vulnerability scanning, but the vulnerability is actually being exploited. In this, make sure the following is done: -Create an important document identifying the parameters of the test. -Say the type of test and when it happens -The rules of the test & how to react to it

ARP Poisoning

The Address Resolution Protocol (ARP) maps IP addresses to network interfaces (MAC addresses). This process means injecting a false IP:MAC lookup into the victims ARP cache. This can be used to perform a variety of attacks, including DoS, spoofing and man in the middle.

The CTA

The Cyber Threat Alliance. A type of Threat Intelligence. This group's members upload specifically formatted threat intelligence. It is scored and validated across other submissions. Members can react faster to threats that are given.

Dumpster Diving

The act of an attacker looking into the trash to possibly find information.

Vulnerability Scanning

The act of scanning for weaknesses and susceptibilities in the network and on individual systems. It is like a penetration test that tries to find weak spots by poking around and see what's open.

Card Cloning

The duplication of a credit card that is unauthorized. It looks, feels, and works like the original card. Does not work with chip cards; the card must be a magnetic swipe card.

Threat Actors

The entity responsible for an event that has an impact on the safety of another identity, often called the malicious actor. There are a broad scope of these, motivations may vary as well.

Domain Reputation

The overall "health" of your branded domain as interpreted by mailbox providers. A bad reputation can cause email delivery to fail. This can prevent spam, but may also prevent a business from being visited.

Threat Research

The overall idea of knowing your enemy to prevent an attack.

Watering Hole Attack

The process of an attacker targeting a third party instead of you to get your information. They basically steal your information from a website you may commonly visit, or otherwise.

Vulnerability Research

The process of analyzing protocols, services, and configurations to discover the vulnerabilities and design flaws that will expose an operating system and its applications to exploit, attack, or misuse. Vulnerabilities can be cross-referenced online. A website like https://nvd.nist.gov/ can be used to do this.

Reconnaissance

The process of observation. You need information before the attack to make it as efficient as possible. Attackers will do this, your job is to prevent it.

Threat Hunting

The process of proactively and iteratively searching through networks to detect and isolate advanced threats that evade existing security solutions.

Vulnerability Impact

The result of a vulnerability being used. Often in the form of the following: -Data loss -Identity theft -Financial loss -Reputation impacts -Availability loss (DoS attacks)

Hash Collision

The same hash value for two different plaintexts. This can be found through brute force. The attacker can generate multiple versions of plaintext to match the hashes.

Keylogging

The tracking of keystrokes, often done through malware.

Dictionary Attack

The use of a dictionary to find a password from common words. For example, someone could make their password 'doorframe' or even simpler words like 'dog' which can make it easier for the attacker to crack the account.

Macros

This automates functions within an application, making it easier to use. This can cause security vulnerabilities though -- hackers can make automated exploits, only needing a user to run a file and agree to run this. A common example of one of these is a press of a button causing three or four keys to be pressed with a one second delay in between.

Memory Leaks

This issue can occur over time when an application can use memory over time but also fail to release it. The result is more and more memory is used until the system finally crashes or hangs.

Scripts

This leads to an automation of tasks. This may be used for updates on a computer, or detecting potential problems and solving them before they happen. Attacks can also be automated using these.

TOCTOU Attack

Time-of-check to time-of-use attack. This attack checks for things that occur on the system, and may abuse other things happening at the same time, or abuse any weirdness that happens when two things are done at the same time.

Rogue Access Points

Unauthorized access points that are set up by a department or an individual. May or may not malicious, but either way, it is a significant backdoor into a network.

Spam

Unsolicited messages, often sent through mail, that may contain advertising or even malicious intent.

Tailgating

Using an unauthorized person to gain unauthorized access to a building by using their credentials.

Social Engineering

Using social skills to trick people into revealing information; often done under pressure. For example, an email may be told as "urgent" causing someone to act quickly, possibly not thinking in the process.

VBA

Visual Basic for Applications. The programming language used to write computer programs in the Microsoft Windows environment.

Vishing

Voice phishing

Attack Vectors

Vulnerabilities that exist in networks, operating systems, apps, databases, mobile devices, and cloud environments. IT professionals spend a lot of their time finding and patching these.

Evil Twins

Wireless networks that pretend to offer trustworthy Wi-Fi connections to the Internet. It looks legitimate, but it isn't.

Phishing

a malicious person or company "pretending" to be who they aren't. For example, a hacker may try to disguise an email filled with malicious content as an Amazon email.

Supply Chain

the connected chain of all of the business entities that create hardware. One exploit within the chain can affect the entire chain.


Ensembles d'études connexes

Connecting Sentences and Clauses

View Set

Unit 5 (Who is this - what is this - Is this? Questions about nouns in singular.)

View Set

Chapter 38: Caring for Clients With Cerebrovascular Disorders

View Set

AP Euro Ch. 20: "The Revolution in Politics"

View Set

Plants: Unit 7 Quiz 3 Study Guide

View Set

PrepU Chapter 66 Neurological Disorders

View Set