19. Course Recap
Course Recap
ND545 C02 L04 A15 Course Overview V2
Great job on finishing this course! Now it's on to the project!
*As a side note, this course is a foundational course that is meant to help build the knowledge to become job-ready, but you will likely need additional training and/or coursework in order to obtain a job in this field. These foundations will set you up for success going forward and are vital to your success in this field. *
Course Key Terms
KeyTerm | Definition |
---|---|
7-zip | is a free and open-source file archiver, a utility used to place groups of files within compressed, encrypted containers known as "archives". |
777 Permissions | Is a level of Linux permissions that means making the file readable, writable and executable by everyone. |
Algorithm | a process or set of rules to be followed in calculations or other problem-solving operations, especially by a computer. |
Asymmetric Encryption | is a cryptographic system that uses pairs of keys. Public keys, which may be disseminated widely, and private keys, which are known only to the owner. |
Authentication | the process or action of verifying the identity of a user or process. |
Automation | is the application of technology in the form of applications or processes to perform tasks, generally repetitive or time-consuming, with minimal human input. |
Bitlocker | is a full volume encryption feature included with Microsoft Windows. |
Blacklist | In computing, a blacklist, denylist or blocklist is a basic access control mechanism that allows through all elements except those explicitly mentioned. Those items on the list are denied access. |
Certificate Authority | is a an organization that acts to validate identities and bind them to cryptographic key pairs with digital certificates. |
Ciphertext | is encrypted text modified from plaintext using an encryption algorithm. |
Collision | is a situation that occurs when two distinct pieces of data have the same hash value. |
Daemons | is a computer program that runs as a background process, rather than being under the direct control of an interactive user. |
Data at rest | means inactive data that is stored physically in any digital form. |
Data in transit | also referred to as data in motion, is defined into two categories, information that flows over the Internet and data that flows in the confines of a private network. |
Detection | if an adversary does get past our defenses we want to know! |
Encryption | is the process that converts plaintext, or text that can be read by anyone, into ciphertext and it can only be read by the person who has the secret code, or decryption key. |
File Hash | is the process of using an algorithm for verifying the integrity of a computer file. |
Firewall | is a network device that monitors and controls incoming and outgoing traffic. |
Firmware | is a software program or set of instructions programmed on a hardware device |
Framework | A set of agreed-upon policies, procedures, and processes that define how information is managed. |
Intrusion Detection System | is a device or application that monitors traffic for malicious activity or policy violations. |
Next Gen Firewall | is a network security device that provides capabilities beyond a traditional, stateful firewall. While a traditional firewall typically provides stateful inspection of incoming and outgoing network traffic, a next-generation firewall includes additional features like application awareness and control, integrated intrusion prevention, and cloud-delivered threat intelligence |
NIST CSF | The Framework is voluntary guidance, based on existing standards, guidelines, and practices for organizations to better manage and reduce cybersecurity risk. |
NIST-800 | NIST’s 800 series presents information of interest to the computer security community. The series comprises guidelines, recommendations, and technical specifications. |
PII | Personally identifiable information is any data that could potentially be used to identify a particular person. Examples include a full name, Social Security number, driver's license number, bank account number, passport number, and email address. |
Plaintext | data that represent only characters of readable material. |
Prevention | which is what most people think when it comes to Cybersecurity. Keep the bad guys out! |
Principle of Least Privilege | is the idea that at any user, program, or process should have only the bare minimum privileges necessary to perform its function. |
Public Key Infrastructure | is a technology for authenticating users and devices. The basic idea is to have one or more trusted parties digitally sign documents certifying that a particular cryptographic key belongs to a particular user or device. |
Repository | is a central location in which data is stored and managed. |
Response | These are the actions or mitigation, we take based on the detection. |
Scalability | is the ability of a computing system to grow or expand gracefully. |
SCCM | System Center Configuration Manager is a systems management software product developed by Microsoft for managing large groups of computers running Windows. |
Vulnerability Scanning | is an automated threat that uses bots or web crawlers to identify security weaknesses in your website and underlying architecture. |
WhoIs | WHOIS isn't an acronym, though it may look like one. In fact, it is the system that asks the question, who is responsible for a domain name or an IP address? In other words, it's the contact information for IP addresses and Websites. |
WSUS | Windows Server Update Services is a computer program and network service developed by Microsoft Corporation that enables administrators to manage the distribution of updates and hotfixes released for Microsoft products to computers in a corporate environment. |
Yum | Yellowdog Updater, Modified is a free and open-source command-line package-management utility for Linux. It allows for automatic updates and package and dependency management. |