Definations Flashcards

(10 cards)

1
Q

Enumeration

A

enumeration means collecting detailed information about a system, network, or service after finding it is alive.

👉 In simple words:
It’s like knocking on a door (scanning), and when someone answers, you start asking questions to learn who lives there, what they do, and how the house is set up (enumeration).

Attackers (and also security testers) use enumeration to gather details such as:
• Usernames
• Shares (shared folders/files)
• Services running
• Network resources
• System info

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

E discovery in the incident response

A

In incident response, E-discovery (electronic discovery) is about collecting and preserving digital evidence (like logs, emails, files, or system data) that might later be needed for investigation or legal purposes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

NETFlow

A

NetFlow
• A network protocol developed by Cisco that collects metadata about IP traffic flows.
• Used for network monitoring, traffic analysis, and security (e.g., detecting anomalies, DDoS patterns, or data exfiltration).
• Focus in Security+: helps with network visibility and intrusion detection.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Hacktivist

A

Hacktivist
• A type of threat actor who hacks for political, social, or ideological reasons (not for money).
• Example: defacing websites to protest government actions.
• Security+: important when identifying threat motivations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Playbook

A

Playbook
• A collection of predefined procedures or scripts for responding to incidents.
• Example: a playbook for ransomware → isolate system, cut off network access, notify incident response team, start recovery.
• Security+: ties into incident response and automation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Technical Debt

A

Technical Debt
• The extra work and risk created when organizations take shortcuts in IT systems or software (e.g., delaying patches, using outdated libraries, skipping best practices).
• Increases vulnerability exposure.
• Security+: highlights why patch management and secure coding are critical.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Continuous Integration (CI)

A

Continuous Integration (CI)
• A DevOps practice where developers frequently merge code changes into a shared repository, automatically tested and built.
• Improves software quality, but if insecure, attackers can inject malicious code into pipelines.
• Security+: focus is on DevSecOps → integrating security checks into CI/CD.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Easy to learn

A

NetFlow → monitors traffic patterns.
• Hacktivist → politically motivated attacker.
• Playbook → incident response guide.
• Technical Debt → risk from shortcuts.
• Continuous Integration → DevOps practice with security implications.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

User Behavior Analysis (UBA)

A

User Behavior Analysis (UBA)
• A security process that monitors and analyzes user actions and patterns to detect abnormal or risky behavior.
• It builds a baseline of what “normal” looks like for each user (logins, file access, data transfers, etc.).
• If a user suddenly does something unusual — like logging in from a strange location at 3 AM or downloading massive amounts of data — UBA flags it as suspicious.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Attestation

A

In cybersecurity, attestation is the process of proving the integrity of a device, software, or environment — basically showing that it hasn’t been tampered with.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly