automates communications between two or more appli-
Application Programming Interface (API) cations. An API defines the types and formats of calls the
system can make and is often free to use
What does SPOG stand for? Single Pane of Glass
To provide a unified view of the security tools and related
What is the purpose of a Single Pane of Glass (SPOG)?
services defending a network.
What advantage does a Single Pane of Glass (SPOG)
It allows them to view and control everything in one place.
provide to network defenders?
automated messages sent from an app. The messages
Webhooks are sent to a unique URL and include relevant information
about the event and when the event occurred.
What are plugins also called? Extensions
Add functionality to an existing piece of hardware or soft-
What do plugins do?
ware without altering the original program.
How do plugins affect security tools? They increase the functionality of security tools.
Involves deconstructing software, hardware, or systems
Reverse Engineering to analyze their inner workings, often without access to
source code
Automated technique that inputs random, unexpected, or
Fuzzing malformed data into software to discover vulnerabilities or
crashes.
Examines a system or application while it is running to
Dynamic Analysis observe its behavior, such as memory usage or runtime
anomalies
Reviews the source code, binary, or configuration files
Static Analysis
without executing the program
What is the goal of Static Analysis?
, "determine if the file contains malicious code"
this is done by disassembling the binary to review the code
without actually executing it
"understand how it works"
What is the goal of Dynamic Analysis? this is done by executing the code (program binary) in a
controlled environment and observing the behavior
describes the effort taken to identify details about a device
more precisely. While a map or discovery scan looks for
Device Fingerprinting
connected devices, a fingerprint scan focuses attention on
an individual device.
describes ways to identify vulnerabilities without directly
Passive Scanning interacting with a device or software. The primary example
of this is network packet capture
includes using a vulnerability scanner, enumerating ser-
vices, performing banner grabbing, content enumeration,
Active scanning
or using a web application scanner such as Burp Suite or
OWASP ZAP
protect systems from abuse from internal threats and pro-
Internal scans
vide layered security.
focus on the view of devices and services from the "out-
External scans side" of the network, broadly referring to the Internet,
whereas internal scans focus on the view from the "inside."
Uses network-based scanning methods without requiring
Agentless Scans software installation on the target system. Typically relies
on protocols like SSH, SNMP, or WMI
Involves installing a lightweight software component
Agent-Based Scans (agent) on the target system to gather data or perform
actions.
Credentialed Scan
2/9