Oversees and coordinates the red and blue teams during assessments
Give this one a try later!
White Team
OSI Layers 2, 1 (Data Link, Physical)
,Give this one a try later!
TCP/IP Network Layer = OSI Layer(s)
Placement of malicious code in SQL statements, via web page input.
Give this one a try later!
SQL Injection
Uses a pair of keys, one for encryption (public key) and one for decryption (private
key)
Give this one a try later!
Asymmetric Key Encryption
OSI Model Layers:
Physical
Data Link
Network
Transport
Session
Presentation
Application
Give this one a try later!
, Please Do Not Throw Sausage Pizza Away
Manages defense and reacts to attacks
Give this one a try later!
Blue Team
Examines each packet entering or leaving the network and accepts or rejects it based
on user-defined rules
Give this one a try later!
Packet Filter (PF)
Delivers software and applications through the internet.
Give this one a try later!
Software as a Service (SaaS):
Designed to enhance the effectiveness of the Red and Blue teams by integrating their
efforts
Give this one a try later!
, Purple Team
Protocols for securing communications over computer networks. TLS is the successor
to SSL
Give this one a try later!
SSL/TLS
Runs on a host operating system that provides virtualization services, such as a
hypervisor layer or through software.
Give this one a try later!
Type 2 (Hosted):
Tactics that trick people into breaking normal security procedures.
Give this one a try later!
Social Engineering
A network designed to handle large volumes of data storage, providing systems with
access to consolidated block-level storage.
Give this one a try later!
Give this one a try later!
White Team
OSI Layers 2, 1 (Data Link, Physical)
,Give this one a try later!
TCP/IP Network Layer = OSI Layer(s)
Placement of malicious code in SQL statements, via web page input.
Give this one a try later!
SQL Injection
Uses a pair of keys, one for encryption (public key) and one for decryption (private
key)
Give this one a try later!
Asymmetric Key Encryption
OSI Model Layers:
Physical
Data Link
Network
Transport
Session
Presentation
Application
Give this one a try later!
, Please Do Not Throw Sausage Pizza Away
Manages defense and reacts to attacks
Give this one a try later!
Blue Team
Examines each packet entering or leaving the network and accepts or rejects it based
on user-defined rules
Give this one a try later!
Packet Filter (PF)
Delivers software and applications through the internet.
Give this one a try later!
Software as a Service (SaaS):
Designed to enhance the effectiveness of the Red and Blue teams by integrating their
efforts
Give this one a try later!
, Purple Team
Protocols for securing communications over computer networks. TLS is the successor
to SSL
Give this one a try later!
SSL/TLS
Runs on a host operating system that provides virtualization services, such as a
hypervisor layer or through software.
Give this one a try later!
Type 2 (Hosted):
Tactics that trick people into breaking normal security procedures.
Give this one a try later!
Social Engineering
A network designed to handle large volumes of data storage, providing systems with
access to consolidated block-level storage.
Give this one a try later!