Advertisement
Guest User

ciso aiml file

a guest
Feb 17th, 2017
111
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 34.90 KB | None | 0 0
  1. <?xml version="1.0" encoding="UTF-8"?>
  2. <aiml>
  3. <!-- File: ciso.aiml -->
  4. <!-- Author: Mr. Pranav Lal -->
  5. <!-- Last modified: September 23, 2016 -->
  6. <!-- -->
  7. <!-- This AIML file is part of the CISO 1.0 chat bot knowledge base. -->
  8. <!-- -->
  9. <!-- The CISO brain is Copyright &copy; 2016 by security-writer. -->
  10. <!-- -->
  11. <!-- The CISO brain is released under the terms of the GNU Lesser General -->
  12. <!-- Public License, as published by the Free Software Foundation. -->
  13. <!-- -->
  14. <!-- This file is distributed WITHOUT ANY WARRANTY; without even the -->
  15. <!-- implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. -->
  16. <!-- -->
  17. <!-- For more information see http://www.security-writer.com -->
  18. <!--The profanity and insults sections have been taken from super's brain which comes with Program-AB-->
  19. <!--categories to determine where the question goes-->
  20. <!-- category to set topic to definitions-->
  21. <category>
  22. <pattern><set>questionwords</set> *</pattern>
  23. <template>
  24. <think>
  25. <set name="topic">definitions</set>
  26. </think>
  27. </template>
  28. </category>
  29. <!-- category that will set the topic to a how question -->
  30. <category>
  31. <pattern>
  32. <set>how</set>
  33. </pattern>
  34. <template>
  35. <think>
  36. <set name="topic">how to</set>
  37. </think>
  38. </template>
  39. </category>
  40. <!-- Account for people writing complex how questions-->
  41. <category>
  42. <pattern><set>how</set> *</pattern>
  43. <template>
  44. <think>
  45. <set name="topic">how to</set>
  46. </think>
  47. </template>
  48. </category>
  49. <!--infosec part starts here-->
  50. <topic name="definitions">
  51. <!--Breakout category for the definitions topic-->
  52. <category>
  53. <pattern>*</pattern>
  54. <template><think><set name="topic"/></think> unknown</template>
  55. </category>
  56. <category>
  57. <pattern>ARE YOU A<SET>BOTSYNONIMS</SET></pattern>
  58. <template>Does it matter</template>
  59. </category>
  60. <category>
  61. <pattern>WHAT IS<SET>SECURITYSYNONYMS</SET> SECURITY</pattern>
  62. <template>The collection of technologies, processes, and practices that protect networked computer systems from unauthorized use or harm.</template>
  63. </category>
  64. <category>
  65. <pattern>WHAT IS INFORMATION SECURITY</pattern>
  66. <template>information security relates to the confidentiality, integrity and availability of data irrespective of whether it is physical or digital.</template>
  67. </category>
  68. <category>
  69. <pattern>WHAT IS A CYBER ATTACK</pattern>
  70. <template>a cyber attack is An offensive action by a malicious actor that is intended to undermine the functions of networked computers and their related resources, including unauthorized access, unapproved changes, and malicious destruction.</template>
  71. </category>
  72. <category>
  73. <pattern>WHAT ARE SOME EXAMPLES OF CYBER ATTACKS</pattern>
  74. <template>a denialof service attack, man in the middle attack, a distributed denial of service attack, brute forcing of credentials, hash collisions</template>
  75. </category>
  76. <category>
  77. <pattern>WHAT ARE THE PROSPECTS IN CYBER SECURITY</pattern>
  78. <template>the prospects are good especially if you can be specific in one area such as penitration testing, code quality review etc at least to start with. also see<a href="http://krebsonsecurity.com/tag/security-career-advice/">This collection of advice from Brian Crebs</a></template>
  79. </category>
  80. <category>
  81. <pattern>HOW DO I LEARN CYBER SECURITY</pattern>
  82. <template>start by reading and then setup a lab where you can try fundamentals in a safe environment</template>
  83. </category>
  84. <category>
  85. <pattern>WHAT IS A CYBER THREAT</pattern>
  86. <template>a cyber threat is the probability of a cyber attack</template>
  87. </category>
  88. <category>
  89. <pattern>WHAT IS A RISK ASSESSMENT</pattern>
  90. <template>estimating the probability of a threat agent exploiting that threat</template>
  91. </category>
  92. <category>
  93. <pattern>WHAT IS A THREAT AGENT</pattern>
  94. <template>a threat agent is an acter who will exploit a threat</template>
  95. </category>
  96. <category>
  97. <pattern>HOW DO I BREAK INTO HACKING</pattern>
  98. <template>
  99. <srai>WHAT ARE THE PROSPECTS IN CYBER SECURITY</srai>
  100. </template>
  101. </category>
  102. <category>
  103. <pattern>I WANT TO HACK*</pattern>
  104. <template>Hmm, good idea but do ask nicely first or participate in a bug bounty. If you have done so then do the following.
  105. Scan the target
  106. see what is running
  107. Figure out how to exploit it
  108. also read books at<a href="https://www.amazon.com/Best-Sellers-Books-Computer-Hacking/zgbs/books/3648">Best Sellers in Computer Hacking</a>
  109. </template>
  110. </category>
  111. <category>
  112. <pattern>I WANT TO BE A HACKER</pattern>
  113. <template>
  114. <srai>I want to hack*</srai>
  115. </template>
  116. </category>
  117. <category>
  118. <pattern>I WANT TO HACK THE*</pattern>
  119. <template>
  120. <srai>I want to hack*</srai>
  121. </template>
  122. </category>
  123. <category>
  124. <pattern>WHAT IS HACKING</pattern>
  125. <template>see this page for a definition of hacking.
  126. <a href="http://www.dictionary.com/browse/hacking">hack-ing</a>
  127. in the context of computers, it commonly refers to gaining unauthorized access to a computer. However, it is also used to indicate a bit of work that involves deep knowledge of computer systems or that involves using programming tricks</template>
  128. </category>
  129. <category>
  130. <pattern>WHAT SKILLS DO I NEED TO BECOME A HACKER</pattern>
  131. <template>curiosity and persistance. Technology skills depend on what you want to hack. For example, if you want to hack a web application, learn how HTML and underlying frameworks function. If you want to break into a linux machine, learn protocol stacks and the workings of operating systems</template>
  132. </category>
  133. <category>
  134. <pattern>WHAT IS THE BEST WAY TO LEARN HACKING?</pattern>
  135. <template>Setup a home lab using virtual machines and read books that provide hands on examples and try them</template>
  136. </category>
  137. <category>
  138. <pattern>WHO IS A SCRIPT KIDDY</pattern>
  139. <template>A person who does not have deep knowledge of systems but uses tools to break into computer systems or networks</template>
  140. </category>
  141. <category>
  142. <pattern>WHO IS A WHITE HAT *</pattern>
  143. <template>An ethical hacker who utilizes his skills to help</template>
  144. </category>
  145. <category>
  146. <pattern>WHO IS A BLACK HAT HACKER *</pattern>
  147. <template>Most hackers do not wear hats. a black hat hacker is an individual who breaches computers or network for malicious ends.</template>
  148. </category>
  149. <category>
  150. <pattern>WHO IS A GRAY HAT HACKER *</pattern>
  151. <template>a gray hat hacker is an individual who make at times break the law or violate typical standards of behaviour when breaching computer systems. However, the intent behind the the violations is not malicious.</template>
  152. </category>
  153. <category>
  154. <pattern>what is cyber security</pattern>
  155. <template>
  156. Cyber security deals with protecting digital information usually on the Internet against attacks orcestrated via other computers or networks of computers or similar devices.
  157. </template>
  158. </category>
  159. <category>
  160. <pattern>WHAT IS IT SECURITY</pattern>
  161. <template>
  162. <srai>WHAT IS CYBER SECURITY</srai>
  163. </template>
  164. </category>
  165. <category>
  166. <pattern>WHAT IS CLOUD COMPUTING</pattern>
  167. <template>Cloud computing is an umbrela term that means different things to different people. in its simplest form, it means on demand access to computing resources that is elastic and scalable without human intervention. This also means that the use of these resources is measured.<a href="http://www.service-architecture.com/articles/cloud-computing/cloud_computing_definition.html">Cloud Computing Definition</a></template>
  168. </category>
  169. <category>
  170. <pattern>WHO IS A HACKER</pattern>
  171. <template>An individual who uses system features in a way they were not designed for or someone who knows a system intimately and is able to use that knowledge in novel ways. Yes, some individuals do break into computer systems.</template>
  172. </category>
  173. <category>
  174. <pattern> what is Access Control</pattern>
  175. <template>
  176. Access Control ensures that resources are only granted to those
  177. users who are entitled to them.
  178. </template>
  179. </category>
  180. <category>
  181. <pattern> what is an Access Control List or ACL</pattern>
  182. <template>
  183. A mechanism that implements access control for a system resource
  184. by listing the identities of the system entities that are
  185. permitted to access the resource.
  186. </template>
  187. </category>
  188. <category>
  189. <pattern> what is an Access Control Service</pattern>
  190. <template>
  191. A security service that provides protection of system resources
  192. against unauthorized access. The two basic mechanisms for
  193. implementing this service are ACLs and tickets.
  194. </template>
  195. </category>
  196. <category>
  197. <pattern> what is Access Management</pattern>
  198. <template>
  199. Access Management is the maintenance of access information which
  200. consists of four tasks: account administration, maintenance,
  201. monitoring, and revocation.
  202. </template>
  203. </category>
  204. <category>
  205. <pattern> what is an Access Matrix</pattern>
  206. <template>
  207. An Access Matrix uses rows to represent subjects and columns to
  208. represent objects with privileges listed in each cell.
  209. </template>
  210. </category>
  211. <category>
  212. <pattern> what is Account Harvesting</pattern>
  213. <template>
  214. Account Harvesting is the process of collecting all the legitimate
  215. account names on a system.
  216. </template>
  217. </category>
  218. <category>
  219. <pattern> what is ACK Piggybacking</pattern>
  220. <template>
  221. ACK piggybacking is the practice of sending an ACK or
  222. acknowledgement inside another packet going to the same
  223. destination.
  224. </template>
  225. </category>
  226. <category>
  227. <pattern> what is Active Content</pattern>
  228. <template>
  229. Program code embedded in the contents of a web page. When the page
  230. is accessed by a web browser, the embedded code is automatically
  231. downloaded and executed on the user's workstation. Examples of
  232. active content technologies include Java applets, ActiveX controls
  233. </template>
  234. </category>
  235. <category>
  236. <pattern> what are Activity Monitors</pattern>
  237. <template>
  238. Activity monitors aim to prevent virus infection by looking for
  239. for malicious activity on a system, and blocking that activity
  240. when possible.
  241. </template>
  242. </category>
  243. <category>
  244. <pattern> what is Address Resolution Protocol or ARP</pattern>
  245. <template>
  246. Address Resolution Protocol (ARP) is a protocol for mapping an
  247. Internet Protocol address to a physical machine address that is
  248. recognized in the local network. A table, usually called the ARP
  249. cache, is used to maintain a correlation between each MAC address
  250. and its corresponding IP address. ARP provides the protocol rules
  251. for making this correlation and providing address conversion in
  252. both directions.
  253. </template>
  254. </category>
  255. <category>
  256. <pattern> what is Advanced Encryption Standard or AES</pattern>
  257. <template>
  258. An encryption standard being developed by NIST. Intended to
  259. specify an unclassified, publicly-disclosed, symmetric encryption
  260. algorithm.
  261. </template>
  262. </category>
  263. <category>
  264. <pattern> what is an Algorithm</pattern>
  265. <template>
  266. A finite set of step-by-step instructions for a problem-solving or
  267. computation procedure, especially one that can be implemented by a
  268. computer.
  269. </template>
  270. </category>
  271. <category>
  272. <pattern> what is an Applet</pattern>
  273. <template>
  274. Java programs; an application program that uses the client's web
  275. browser to provide a user interface.
  276. </template>
  277. </category>
  278. <category>
  279. <pattern> what is the ARPANET</pattern>
  280. <template>
  281. Advanced Research Projects Agency Network, a pioneering
  282. packet-switched network that was built in the early 1970s under
  283. contract to the US Government, led to the development of
  284. today&amp;#039;s Internet, and was decommissioned in June 1990.
  285. </template>
  286. </category>
  287. <category>
  288. <pattern> what is Asymmetric Cryptography</pattern>
  289. <template>
  290. Public-key cryptography; A modern branch of cryptography in which
  291. the algorithms employ a pair of keys (a public key and a private
  292. key) and use a different component of the pair for different steps
  293. of the algorithm.
  294. </template>
  295. </category>
  296. <category>
  297. <pattern> what is Asymmetric Warfare</pattern>
  298. <template>
  299. Asymmetric warfare is the fact that a small investment of the attacker, properly leveraged, can yield incredible results.
  300. </template>
  301. </category>
  302. <category>
  303. <pattern> what is Auditing</pattern>
  304. <template>
  305. Auditing in the context of information security is the information
  306. gathering and analysis of assets to ensure such things as policy
  307. compliance and security from vulnerabilities.
  308. </template>
  309. </category>
  310. <category>
  311. <pattern> what is Authentication</pattern>
  312. <template>
  313. Authentication is the process of confirming the correctness of the
  314. claimed identity.
  315. </template>
  316. </category>
  317. <category>
  318. <pattern> what is Authenticity</pattern>
  319. <template>
  320. Authenticity is the validity and conformance of the original
  321. information.
  322. </template>
  323. </category>
  324. <category>
  325. <pattern> what is Authorization</pattern>
  326. <template>
  327. Authorization is the approval, permission, or empowerment for
  328. someone or something to do something.
  329. </template>
  330. </category>
  331. <category>
  332. <pattern> what is an Autonomous System</pattern>
  333. <template>
  334. One network or series of networks that are all under one
  335. administrative control. An autonomous system is also sometimes
  336. referred to as a routing domain. An autonomous system is assigned
  337. a globally unique number, sometimes called an Autonomous System
  338. Number (ASN).
  339. </template>
  340. </category>
  341. <category>
  342. <pattern> what is Availability</pattern>
  343. <template>
  344. Availability is the need to ensure that the business purpose of
  345. the system can be met and that it is accessible to those who need
  346. to use it.
  347. </template>
  348. </category>
  349. <category>
  350. <pattern> what is a Backdoor</pattern>
  351. <template>
  352. A backdoor is a tool installed after a compromise to give an
  353. attacker easier access to the compromised system around any
  354. security mechanisms that are in place.
  355. </template>
  356. </category>
  357. <category>
  358. <pattern> what is Bandwidth</pattern>
  359. <template>
  360. Commonly used to mean the capacity of a communication channel to
  361. pass data through the channel in a given amount of time. Usually
  362. expressed in bits per second.
  363. </template>
  364. </category>
  365. <category>
  366. <pattern> what is a Banner</pattern>
  367. <template>
  368. A banner is the information that is displayed to a remote user
  369. trying to connect to a service. This may include version
  370. information, system information, or a warning about authorized
  371. use.
  372. </template>
  373. </category>
  374. <category>
  375. <pattern> what is Basic Authentication</pattern>
  376. <template>
  377. Basic Authentication is the simplest web-based authentication
  378. scheme that works by sending the username and password with each
  379. request.
  380. </template>
  381. </category>
  382. <category>
  383. <pattern> what is a Bastion Host</pattern>
  384. <template>
  385. A bastion host has been hardened in anticipation of
  386. vulnerabilities that have not been discovered yet.
  387. </template>
  388. </category>
  389. <category>
  390. <pattern> what is BIND</pattern>
  391. <template>
  392. BIND stands for Berkeley Internet Name Domain and is an
  393. implementation of DNS. DNS is used for domain name to IP address
  394. resolution.
  395. </template>
  396. </category>
  397. <category>
  398. <pattern> what is Biometrics</pattern>
  399. <template>
  400. Biometrics use physical characteristics of the users to determine
  401. access.
  402. </template>
  403. </category>
  404. <category>
  405. <pattern> what is a Bit</pattern>
  406. <template>
  407. The smallest unit of information storage; a contraction of the
  408. term "binary digit;" one of two symbolsѢ0" (zero) and "1" (one) -
  409. that are used to represent binary numbers.
  410. </template>
  411. </category>
  412. <category>
  413. <pattern> what is a Block Cipher</pattern>
  414. <template> A block cipher encrypts one block of data at a time.</template>
  415. </category>
  416. <category>
  417. <pattern> what is a Boot Record Infector</pattern>
  418. <template>
  419. A boot record infector is a piece of malware that inserts
  420. malicious code into the boot sector of a disk.
  421. </template>
  422. </category>
  423. <category>
  424. <pattern> what is the Border Gateway Protocol or BGP</pattern>
  425. <template>
  426. An inter-autonomous system routing protocol. BGP is used to
  427. exchange routing information for the Internet and is the protocol
  428. used between Internet service providers (ISP).
  429. </template>
  430. </category>
  431. <category>
  432. <pattern> what is a Botnet</pattern>
  433. <template>
  434. A botnet is a large number of compromised computers that are used
  435. to create and send spam or viruses or flood a network with
  436. messages as a denial of service attack.
  437. </template>
  438. </category>
  439. <category>
  440. <pattern> what is a Bridge</pattern>
  441. <template>
  442. A product that connects a local area network (LAN) to another
  443. local area network that uses the same protocol (for example,
  444. Ethernet or token ring).
  445. </template>
  446. </category>
  447. <category>
  448. <pattern> what is British Standard 7799</pattern>
  449. <template>
  450. A standard code of practice and provides guidance on how to secure
  451. an information system. It includes the management framework,
  452. objectives, and control requirements for information security
  453. management systems.
  454. </template>
  455. </category>
  456. <category>
  457. <pattern> what is a Broadcast</pattern>
  458. <template>
  459. To simultaneously send the same message to multiple recipients.
  460. One host to all hosts on network.
  461. </template>
  462. </category>
  463. <category>
  464. <pattern> what is a Broadcast Address</pattern>
  465. <template>
  466. An address used to broadcast a datagram to all hosts on a given
  467. network using UDP or ICMP protocol.
  468. </template>
  469. </category>
  470. <category>
  471. <pattern> what is a Browser</pattern>
  472. <template>
  473. A client computer program that can retrieve and display
  474. information from servers on the World Wide Web.
  475. </template>
  476. </category>
  477. <category>
  478. <pattern> what is Brute Force</pattern>
  479. <template>
  480. A cryptanalysis technique or other kind of attack method involving
  481. an exhaustive procedure that tries all possibilities, one-by-one.
  482. </template>
  483. </category>
  484. <category>
  485. <pattern> what is a Buffer Overflow</pattern>
  486. <template>
  487. A buffer overflow occurs when a program or process tries to store
  488. more data in a buffer (temporary data storage area) in a
  489. computer's memory than it was intended to hold. Since buffers are
  490. created to contain a finite amount of data, the extra information
  491. - which has to go somewhere - can overflow into adjacent buffers,
  492. corrupting or overwriting the valid data held in them.
  493. </template>
  494. </category>
  495. <category>
  496. <pattern> what is a Business Continuity Plan or BCP</pattern>
  497. <template>
  498. A Business Continuity Plan is the plan for emergency response,
  499. backup operations, and post-disaster recovery steps that will
  500. ensure the availability of critical resources and facilitate the
  501. continuity of operations in an emergency situation.
  502. </template>
  503. </category>
  504. <category>
  505. <pattern> what is Business Impact Analysis or BIA</pattern>
  506. <template>
  507. A Business Impact Analysis determines what levels of adverse
  508. impact usually in the form of down time to a system are tolerable.
  509. </template>
  510. </category>
  511. <category>
  512. <pattern> what is a Byte</pattern>
  513. <template>
  514. A fundamental unit of computer storage; the smallest addressable
  515. unit in a computer's memory.
  516. </template>
  517. </category>
  518. <category>
  519. <pattern> what is Cache</pattern>
  520. <template>
  521. Pronounced cash, a special high-speed storage mechanism. It can be
  522. either a reserved section of main memory or an independent
  523. high-speed storage device. Two types of caching are commonly used
  524. in personal computers: memory caching and disk caching.
  525. </template>
  526. </category>
  527. <category>
  528. <pattern> what is Cache Cramming</pattern>
  529. <template>
  530. Cache Cramming is the technique of tricking a browser to run
  531. cached Java code from the local disk, instead of the internet
  532. zone, so it runs with less restrictive permissions.
  533. </template>
  534. </category>
  535. <category>
  536. <pattern> what is Cache Poisoning</pattern>
  537. <template>
  538. Malicious or misleading data from a remote name server is saved
  539. cached by another name server. Typically used with DNS cache
  540. poisoning attacks.
  541. </template>
  542. </category>
  543. <category>
  544. <pattern> what Call Admission Control or CAC</pattern>
  545. <template>
  546. The inspection and control of all inbound and outbound voice
  547. network activity by a voice firewall based on user-defined
  548. policies.
  549. </template>
  550. </category>
  551. <category>
  552. <pattern> what is a Cell</pattern>
  553. <template>
  554. A cell is a unit of data transmitted over an ATM network.
  555. </template>
  556. </category>
  557. <category>
  558. <pattern> what is Certificate Based Authentication</pattern>
  559. <template>
  560. Certificate-Based Authentication is the use of SSL and
  561. certificates to authenticate and encrypt HTTP traffic.
  562. </template>
  563. </category>
  564. <category>
  565. <pattern> what is CGI</pattern>
  566. <template>
  567. Common Gateway Interface. This mechanism is used by HTTP servers
  568. (web servers) to pass parameters to executable scripts in order to
  569. generate responses dynamically.
  570. </template>
  571. </category>
  572. <category>
  573. <pattern> what is Chain of Custody</pattern>
  574. <template>
  575. Chain of Custody is the application of rules of evidence and its
  576. handling. These differ across jurisdictions.
  577. </template>
  578. </category>
  579. <category>
  580. <pattern>
  581. what is the Challenge Handshake Authentication Protocol or CHAP
  582.  
  583. </pattern>
  584. <template>
  585. The Challenge-Handshake Authentication Protocol uses a
  586. challenge/response authentication mechanism where the response
  587. varies every challenge to prevent replay attacks.
  588. </template>
  589. </category>
  590. <category>
  591. <pattern> what is a Checksum</pattern>
  592. <template>
  593. A value that is computed by a function that is dependent on the
  594. contents of a data object and is stored or transmitted together
  595. with the object, for the purpose of detecting changes in the data.
  596. </template>
  597. </category>
  598. <category>
  599. <pattern> what is a Cipher</pattern>
  600. <template>
  601. A cryptographic algorithm for encryption and decryption.
  602. </template>
  603. </category>
  604. <category>
  605. <pattern> what is Ciphertext</pattern>
  606. <template>
  607. Ciphertext is the encrypted form of the message being sent.
  608. </template>
  609. </category>
  610. <category>
  611. <pattern> what is Circuit Switched Network</pattern>
  612. <template>
  613. A circuit switched network is where a single continuous physical
  614. circuit connected two endpoints where the route was immutable once
  615. set up.
  616. </template>
  617. </category>
  618. <category>
  619. <pattern> what is Client</pattern>
  620. <template>
  621. A system entity that requests and uses a service provided by
  622. another system entity, called a "server." In some cases, the
  623. server may itself be a client of some other server.
  624. </template>
  625. </category>
  626. <category>
  627. <pattern> what is a Collision</pattern>
  628. <template>
  629. A collision occurs when multiple systems transmit simultaneously
  630. on the same wire.
  631. </template>
  632. </category>
  633. <category>
  634. <pattern> what is Competitive Intelligence</pattern>
  635. <template>
  636. Competitive Intelligence is espionage using legal, or at least not
  637. obviously illegal, means.
  638. </template>
  639. </category>
  640. <category>
  641. <pattern> what is a Computer Emergency Response Team or CERT</pattern>
  642. <template>
  643. An organization that studies computer and network INFOSEC in order
  644. to provide incident response services to victims of attacks,
  645. publish alerts concerning vulnerabilities and threats, and offer
  646. other information to help improve computer and network security.
  647. </template>
  648. </category>
  649. <category>
  650. <pattern> what is a Computer Network</pattern>
  651. <template>
  652. A collection of host computers together with the sub-network or
  653. inter-network through which they can exchange data.
  654. </template>
  655. </category>
  656. <category>
  657. <pattern> what is Confidentiality</pattern>
  658. <template>
  659. Confidentiality is the need to ensure that information is
  660. disclosed only to those who are authorized to view it.
  661. </template>
  662. </category>
  663. <category>
  664. <pattern> what is Configuration Management</pattern>
  665. <template>
  666. A process to Establish a known baseline condition and manage it.
  667. </template>
  668. </category>
  669. <category>
  670. <pattern> what is a Cookie</pattern>
  671. <template>
  672. A peace of text contained in a file to allow data exchanged
  673. between an HTTP server and a browser (a client of the server) to
  674. store state information on the client side and retrieve it later
  675. for server use. An HTTP server, when sending data to a client, may
  676. send along a cookie, which the client retains after the HTTP
  677. connection closes. A server can use this mechanism to maintain
  678. persistent client-side state information for HTTP-based
  679. applications, retrieving the state information in later
  680. connections.
  681. </template>
  682. </category>
  683. <category>
  684. <pattern> what is Corruption</pattern>
  685. <template>
  686. A threat action that undesirably alters system operation by
  687. adversely modifying system functions or data.
  688. </template>
  689. </category>
  690. <category>
  691. <pattern> what is Cost Benefit Analysis</pattern>
  692. <template>
  693. A cost benefit analysis compares the cost of implementing
  694. countermeasures with the value of the reduced risk.
  695. </template>
  696. </category>
  697. <category>
  698. <pattern> what is a Countermeasure</pattern>
  699. <template>
  700. Reactive methods used to prevent an exploit from successfully
  701. occurring once a threat has been detected. Intrusion Prevention
  702. Systems (IPS) commonly employ countermeasures to prevent intruders
  703. form gaining further access to a computer network. Other counter
  704. measures are patches, access control lists and malware filters.
  705. </template>
  706. </category>
  707. <category>
  708. <pattern> what are Covert Channels</pattern>
  709. <template>
  710. Covert Channels are the means by which information can be
  711. communicated between two parties in a covert fashion using normal
  712. system operations. For example by changing the amount of hard
  713. drive space that is available on a file server can be used to
  714. communicate information.
  715. </template>
  716. </category>
  717. <category>
  718. <pattern> what is Cron</pattern>
  719. <template>
  720. Cron is a Unix application that runs jobs for users and
  721. administrators at scheduled times of the day.
  722. </template>
  723. </category>
  724. <category>
  725. <pattern> what is aCrossover Cable</pattern>
  726. <template>
  727. A crossover cable reverses the pairs of cables at the other end
  728. and can be used to connect devices directly together.
  729. </template>
  730. </category>
  731. <category>
  732. <pattern> what is Cryptanalysis</pattern>
  733. <template>
  734. The mathematical science that deals with analysis of a
  735. cryptographic system in order to gain knowledge needed to break or
  736. circumvent the protection that the system is designed to provide.
  737. In other words, convert the cipher text to plaintext without
  738. knowing the key. Cryptographic Algorithm or Hash An algorithm that
  739. employs the science of cryptography, including encryption
  740. algorithms, cryptographic hash algorithms, digital signature
  741. algorithms, and key agreement algorithms.
  742. </template>
  743. </category>
  744. <category>
  745. <pattern> what is Cut Through</pattern>
  746. <template>
  747. Cut-Through is a method of switching where only the header of a
  748. packet is read before it is forwarded to its destination.
  749. </template>
  750. </category>
  751. <category>
  752. <pattern> what is Cyclic Redundancy Check or CRC</pattern>
  753. <template>
  754. A type of checksum algorithm that is not a cryptographic hash but
  755. is used to implement data integrity service where accidental
  756. changes to data are expected.
  757. </template>
  758. </category>
  759. <category>
  760. <pattern>what is integrity</pattern>
  761. <template>Integrity refers to the accuracy of data. Data should remain unchanged from its original form unless the change has been authorized.</template>
  762. </category>
  763. </topic>
  764. <topic name="how to">
  765. <!-- breakout category for the how to topic-->
  766.  
  767. <category>
  768.      <pattern>*</pattern>
  769.      <template><think><set name="topic"/></think> unknown</template>
  770. </category>
  771. <category>
  772. <pattern>what keeps you awake at night</pattern>
  773. <template>One of the things that I do is to constantly look for enterprise wide patterns of events that are precursers to an attack. These go beyond individual tools. Thret intelligence plays a key role here along with event corelation. I am not only talking about feeds that tools provide but also tracking social media and the conversations that stake holders are having about the company. I have an incident management framework in place to handle a crisis.</template></category><category><pattern>How do you stay updated</pattern><template>I track several blogs and industry forums as well as social media to stay updated on vulnerabilities, large attacks irrespective of thevictim's domain. I maintain a strong interface with product vendors to stay updated with the latest fixes in their products.
  774. </template></category>
  775. <category><pattern> Are you confident that you know all the latest vulnerabilities and industry knowledge?</pattern><template><srai>How do you stay updated</srai></template></category>
  776. <category><pattern>how * latest vulnerabilities</pattern><template><srai>How do you stay updated</srai></template></category>
  777. <category><pattern>what will you do in a crisis</pattern>
  778. <template>
  779. My focus is on root cause analysis. I would determine what assets have been compromised and alert relevant stake holders. I would then put crisis management plans into operations and where necessary bring in outside help especially for areas such as forensic analysis. I would be the single point of contact especially for the board during the duration of the crisis.
  780. </template>
  781. </category>
  782. <category><pattern>what will you do if a breach occurs</pattern><template><srai>what will you do in a crisis</srai></template></category>
  783. <category><pattern>How will you manage incidents</pattern><template><srai>what will you do in a crisis</srai></template></category>
  784. <category><pattern>what keeps you awake *</pattern><template><srai>what keeps you awake at night</srai></template></category>]
  785. <category><pattern>Did you sleep *</pattern><template><srai>what keeps you awake at night</srai></template></category>
  786. <category><pattern>what will you do in a cyber attack</pattern><template><srai>what will you do in a crisis</srai></template></category>
  787. <category><pattern>HOW do I<set>defendsynonyms</set> data</pattern><template>
  788. It depends on the size of your organization. however, mostly, you need to keep regular backups, test them, ensure that all systems irrespective of their place in your network are fully patched.
  789. </template></category>
  790. <category><pattern>how do i<set>defendsynonyms</set> against<set>malwaresynonims</set></pattern><template>
  791. the best defense is prevention. rapid patching across the entire landscape, frequent testing of software and using native features of operating systems for protection will help.
  792. </template></category>
  793. </topic>
  794. </aiml>
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement