Ais
Ais
Biometric Identifier
Explanation: This is a unique biological characteristic used to identify and
authenticate individuals. These characteristics are typically physiological
(related to body structure) or behavioral (related to learned patterns).
Examples: Fingerprints, facial recognition, iris scans, voice recognition, gait
analysis.
Multifactor Authentication (MFA)
Explanation: This is an authentication method that requires users to provide
two or more different authentication factors from different categories
(something you know, something you have, something you are) to verify their
identity.
Goal: To significantly enhance security by making it much harder for an
attacker to compromise an account, even if they know the password.
Example: Logging into your bank account might require your password
(something you know) and a one-time code sent to your phone (something
you have).
Multimodal Authentication
Explanation: This is an authentication method that uses multiple
biometric identifiers from the same or different categories to verify a
user's identity.
Goal: To improve the accuracy and reliability of biometric authentication by
combining the strengths of different biometric modalities and mitigating the
weaknesses of individual methods.
Example: Using both facial recognition and iris scanning to authenticate a
user.
Authorization
Explanation: This is the process of determining what an authenticated
user, device, or process is allowed to do once their identity has been
verified. It answers the question "What are you allowed to access?" or "What
actions are you permitted?"
Goal: To enforce access control policies and ensure that users only have the
necessary privileges to perform their tasks.
Examples: Read-only access to a file, permission to execute a program,
access to specific network resources.
Access Control Matrix
Explanation: This is a conceptual model that represents the permissions
that each subject (user, process) has for each object (file, resource). It's a
table where rows typically represent subjects, columns represent objects, and
the entries at the intersections define the access rights.
Purpose: To provide a structured way to define and manage access control
policies. While rarely implemented directly in large systems, it serves as a
fundamental concept for understanding access control.
Compatibility Test
Explanation (in a security context): While "compatibility test" has
broader meanings, in a security context, it often refers to testing the
interaction and interoperability of different security controls or
systems. The goal is to ensure that they work together effectively and don't
create unexpected vulnerabilities or conflicts.
Examples: Testing if a new firewall rule correctly interacts with existing
intrusion detection system rules, or ensuring that different encryption
methods are compatible within a system.
Penetration Test (Pen Test)
Explanation: This is a simulated cyberattack performed on a computer
system, network, or application to identify vulnerabilities that an attacker
could exploit. Ethical hackers (pen testers) use the same tools and techniques
as malicious attackers to probe for weaknesses.
Goal: To proactively identify security flaws before they can be exploited by
real attackers, allowing organizations to remediate them.
Change Control and Change Management
Explanation: This is a structured process for managing changes to IT
systems, infrastructure, and applications. It involves documenting proposed
changes, assessing their potential impact (including security implications),
obtaining approvals, implementing the changes, and verifying their success.
Goal: To minimize the risk of disruptions, errors, and security vulnerabilities
that can arise from poorly managed changes. Security considerations are a
crucial part of the change management process.
Border Router
Explanation: This is a router that sits at the edge of a network, connecting
it to an external network, most commonly the internet. It acts as the first line
of defense for the internal network.
Key Functions: Routing traffic between the internal and external networks,
often implementing basic security measures like access control lists (ACLs) to
filter traffic.
Firewall
Explanation: This is a network security system that controls incoming
and outgoing network traffic based on predefined security rules. It acts as
a barrier between a trusted internal network and an untrusted external
network (like the internet).
Key Functions: Blocking unauthorized access, filtering traffic based on
source/destination IP addresses, ports, and protocols, and often providing
stateful inspection to track connections.
Demilitarized Zone (DMZ)
Explanation: This is a physically or logically isolated subnetwork that sits
between a trusted internal network and an untrusted external network (like
the internet). It hosts publicly accessible services (e.g., web servers, email
servers) while protecting the internal network from direct exposure to
external threats.
Purpose: To provide controlled access to necessary public services without
compromising the security of the internal network. If a server in the DMZ is
compromised, the attacker's access to the internal network is still limited by
the firewall separating the DMZ from the internal network.
Routers
Explanation: These are networking devices that forward data packets
between computer networks. They operate at the network layer (Layer 3) of
the OSI model and use routing tables to determine the best path for data to
travel.
Key Functions (in a security context): While their primary function is
routing, routers can also implement basic security features like Access
Control Lists (ACLs) to filter traffic based on source and destination IP
addresses and ports. Border routers, in particular, play a significant role in
network perimeter security.
Access Control List (ACL)
Explanation: An ACL is a list of permissions associated with a network
resource (like a router interface, file, or directory). It specifies which subjects
(users, devices, or processes) are granted or denied access to that resource
and what type of access they have (e.g., read, write, execute).
How it Works: When a subject attempts to access a resource protected by
an ACL, the system checks the ACL entries sequentially to see if there's a
matching rule that applies to the subject and the requested action. The first
matching rule determines whether access is granted or denied.
Packet Filtering
Explanation: This is a basic firewall technique that controls network access
by examining the headers of network packets and allowing or blocking
them based on predefined rules. These rules typically consider source and
destination IP addresses, port numbers, and protocols.
Limitations: Packet filtering operates at Layers 3 and 4 of the OSI model and
doesn't examine the actual data content of the packets. It can be susceptible
to certain types of attacks.
Deep Packet Inspection (DPI)
Explanation: This is a more advanced firewall technique that goes beyond
examining packet headers and analyzes the actual data content
(payload) of network packets. This allows for more granular control and
the detection of sophisticated threats, malware, and application-layer
attacks.
Benefits: Can identify malicious content, enforce application-level policies,
and provide better visibility into network traffic.
Considerations: DPI can be resource-intensive and raise privacy concerns
due to the inspection of packet content.
Intrusion Prevention System (IPS)
Explanation: An IPS is a security device or software that actively monitors
network traffic for malicious activity and takes automated actions to
prevent or block detected threats in real-time. It goes beyond simply
detecting intrusions (like an IDS) and aims to stop them.
Actions: Blocking malicious traffic, terminating sessions, resetting
connections, and alerting administrators.
Placement: Often deployed inline on network traffic paths to actively
intercept and analyze data.
Endpoints
Explanation: These are the end-user devices that connect to a network.
They are often the targets of attacks and can also be entry points for threats
to spread within an organization.
Examples: Desktops, laptops, smartphones, tablets, servers, and even IoT
devices. Securing endpoints is a critical aspect of overall security.
Vulnerabilities
Explanation: These are weaknesses or flaws in software, hardware, or
processes that could be exploited by an attacker to gain unauthorized access,
cause harm, or disrupt operations.
Examples: Software bugs, design flaws, misconfigurations, and weak
passwords.
Vulnerability Scanners
Explanation: These are automated tools used to identify and report
potential vulnerabilities in systems, networks, and applications. They work
by scanning for known weaknesses, misconfigurations, and missing patches.
Types: Network scanners, web application scanners, host-based scanners.
Output: Generate reports detailing identified vulnerabilities, their severity,
and often recommendations for remediation.
Exploit
Explanation: This is a piece of code, a technique, or a sequence of
commands that takes advantage of a known vulnerability in a system or
application to achieve a specific malicious outcome (e.g., gaining
unauthorized access, executing arbitrary code, causing a denial of service).
Patch
Explanation: This is a software update designed to fix bugs, address
security vulnerabilities, or improve the functionality of a system or
application. Vendors release patches regularly to address identified
weaknesses.
Patch Management
Explanation: This is the process of systematically acquiring, testing,
and installing patches on systems and applications to keep them up-to-
date and secure. Effective patch management is crucial for mitigating known
vulnerabilities.
Key Activities: Identifying needed patches, prioritizing deployment, testing
patches in a non-production environment, deploying patches in a controlled
manner, and verifying successful installation.
Hardening
Explanation: This is the process of strengthening the security of a
system or application by reducing its attack surface and eliminating
potential vulnerabilities. This involves configuring systems securely, disabling
unnecessary services, removing default accounts, and implementing security
best practices.
Log Analysis
Explanation: This is the process of collecting, reviewing, and
interpreting system and application logs to identify security incidents,
suspicious activity, performance issues, or operational problems. Logs
provide a record of events that have occurred on a system.
Importance: Crucial for detecting breaches, understanding attack patterns,
troubleshooting issues, and ensuring compliance. Security Information and
Event Management (SIEM) systems often automate log collection and
analysis.
Intrusion Detection System (IDS)
Explanation: An IDS is a security system that monitors network or
system activity for malicious behavior or policy violations. When
suspicious activity is detected, it typically generates alerts for security
personnel.
Types: Network-based IDS (NIDS) monitors network traffic, while host-based
IDS (HIDS) monitors activity on individual systems.
Difference from IPS: An IDS primarily detects and alerts, while an IPS takes
active measures to prevent intrusions.
Computer Incident Response Team (CIRT)
Explanation: This is a team of individuals within an organization (or an
outsourced team) responsible for handling and managing security
incidents. Their role is to detect, analyze, contain, eradicate, and recover
from security breaches and other cyber events.
Key Responsibilities: Incident triage, analysis, containment, eradication,
recovery, and post-incident analysis.
Virtualization
Explanation: This is a technology that allows you to create virtual versions
of hardware resources, such as servers, operating systems, storage, and
networks. This enables running multiple operating systems and applications
on a single physical machine.
Security Implications: Virtualization can offer security benefits like isolation
of environments and easier disaster recovery. However, it also introduces new
security challenges related to the hypervisor, virtual machine sprawl, and
communication between virtual environments.
Cloud Computing
Explanation: This is the delivery of computing services—including
servers, storage, databases, networking, software, analytics, and
intelligence—over the Internet ("the cloud"). Users can access and pay
for these services on demand.
Security Implications: Cloud security is a shared responsibility between the
cloud provider and the customer. Organizations need to understand the
security controls provided by the cloud provider and implement their own
security measures to protect their data and applications in the cloud.
1. Conduct Reconnaissance (Recon)
Explanation: This is the information gathering phase where the attacker
aims to learn as much as possible about the target organization, its systems,
networks, employees, and security posture. The goal is to identify potential
vulnerabilities and attack vectors.
Activities:
o Passive Reconnaissance: Gathering publicly available information
without directly interacting with the target. Examples include:
Searching social media profiles (LinkedIn, Twitter, etc.) for
employee information and organizational structure.
Reviewing the target's website for technologies used, contact
information, and organizational details.
Using search engines (Google dorking) to find publicly exposed
documents or information.
Examining DNS records to understand the target's network
infrastructure.
Monitoring job postings for insights into technologies and skills
within the organization.
o Active Reconnaissance: Directly interacting with the target's
systems to gather information. This carries a higher risk of detection.
Examples include:
Port scanning to identify open ports and running services.
Network scanning to map the target's network infrastructure.
Sending emails (without malicious intent at this stage) to gather
information about email formats or server responses.
Visiting the target's physical locations to observe security
measures and employee behavior.
2. Attempt Social Engineering
Explanation: This stage involves manipulating individuals within the
target organization to gain access to information, systems, or physical
locations. Attackers exploit human psychology and trust rather than technical
vulnerabilities.
Techniques:
o Phishing: Sending deceptive emails, text messages (SMS phishing or
smishing), or voice calls (vishing) to trick users into revealing sensitive
information or clicking malicious links.
o Pretexting: Creating a believable scenario or identity to persuade a
victim to provide information or perform an action.
o Baiting: Offering something enticing (e.g., a USB drive with malware)
to lure victims into taking a compromising action.
o Quid Pro Quo: Offering a benefit in exchange for information or
access.
o Tailgating/Piggybacking: Physically following authorized personnel
into restricted areas.
3. Scan and Map the Target
Explanation: Once some initial information is gathered, the attacker will
actively scan the target's network and systems to identify live hosts,
open ports, running services, operating systems, and potential vulnerabilities.
This creates a detailed "map" of the target's attack surface.
Tools and Techniques:
o Port Scanners (e.g., Nmap): Identify open TCP and UDP ports on
target systems, revealing running services.
o Network Scanners: Discover active hosts and their MAC addresses
on the network.
o Vulnerability Scanners: Identify known security weaknesses in the
identified services and applications.
o Service Enumeration: Gathering more detailed information about the
versions and configurations of running services.
o OS Fingerprinting: Attempting to identify the operating system
running on target hosts.
4. Research
Explanation: Based on the information gathered during the scanning and
mapping phase, the attacker will research known vulnerabilities
associated with the identified operating systems, applications, and services.
They will look for publicly available exploits or develop their own.
Activities:
o Searching vulnerability databases (e.g., CVE, NVD).