Advanced Search
Search Results
614 total results found
Introduction
Welcome to Security+. Let's grind this out before its graduation day. Challenges Sophisticated Attacks Proliferation of Attack Software Attack Scale and Velocity Control Types Employs the CIA triad. Controls are organized in three main ways: the way they're...
Threat Actors
We need to create profiles of the different types of attacks we see. Historically, cybersecurity techniques relied on the identification of static known threats, like viruses, rootkits, trojans, botnets, and other software-specific exploits. However, we also n...
General Attack Strategies
What are the most common methods attackers use to conduct an exploit? Attack Strategy Description Reconnaissance Gathering information about an organization. Includes system hardware info, network configurations, and individual user information. Socia...
General Defense Strategies
What are the common methods organizations use to defend their systems from attacks? Methodology Description Layering Layering involves implementing multiple security strategies to protect the same asset. Defense in depth or security in depth is based on...
Attack Surfaces
All the points at which a malicious actor could try to exploit a vulnerability. Any location or method where a threat actor can interact with a network port, app, computer, or user is part of a potential attack surface. To reduce the surface, one needs to rest...
Sophisticated Attacks
Complex attacks that are difficult to detect and thwart. Sophisticated attacks use common internet tools and protocols, making it difficult to distinguish an attack from real traffic. They also vary their behavior, making each attack look a little different ea...
Proliferation of Attack Software
A wide variety of attack tools that are freely available on the Internet, making any reasonably knowledgeable person able to execute highly complex attacks.
Attack Scale and Velocity
Modern attacks spread very quickly, up to millions of computers in a matter of minutes or even days.
Social Engineering
Use Loki's tactics to convince unsuspecting users to provide sensitive data or to violate security guidelines. The social engineering process can be divided into three main phases: reasearch, development, and exploitation. Research In this phase, the attacker ...
Malware
Software that serves a malicious purpose, typically installed without the user's consent (or knowledge). There are multiple types of malware: Computer Viruses Spyware & Keyloggers Backdoors & Remote Access Trojans (RATs) Rootkits Ransomware Logic Bombs Virus...
Linux IP Address Config Example
Step-by-step tutorial for Linux static IP configuration. View the current state of the network card in the IT-Laptop computer. From the Favorites bar, select Terminal. At the prompt, type ip addr show and press Enter to view the current state of the network...
Address Resolution Protocol
A Layer 2 protocol that enables hosts to map IP addresses to MAC addresses in their local network. Since all devices on a network are identified by their IP addresses, but NICs use MAC addresses instead, hosts need a way to associate their neighbors in the loc...
Virtual Private Network
A type of network that uses encryption to forward IP traffic over a TCP/IP network. Tunneling protocols are used to encrypt packet contents and wraps them in an unencrypted packet. Tunnel endpoints are allowed to encrypt and decrypt VPN packets. Two endpoints...
Network Interface Card
aliases: NIC A hardware device responsible for managing the communication between a PC system and it's connected network. It does this by converting a digital data stream that can be sent along the transmission medium. Physical Addressing Each network inte...
Onboarding
The process that is followed when an organization enters a partnership with a new employee. This includes things like filling out Human Resources paperwork and setting up a new work environment for the employee. Normally, HR will ensure completion of all the n...
Optical Time Domain Reflectometer
A type of time domain reflectometer that is used with optical fiber. #II
Network Rack
#I Component Visualization A = Ethernet routerB = Ethernet switchC = Ethernet patch panelD = Fiber patch panelE and F = ServersG and H = UPSsI = Wireless controller
Peripheral Component Interconnect
aliases: PCI The most common expansion bus type, with three generations, PCIe x16 being the fastest and typically used for GPUs. PCI was developed to replace the obsolete Industry Standard Architecture (ISA) and (Video Electronic Standards Association) VES...