A Flashcards
Availability
Assurance that the systems responsible for delivering, storing, and processing information are accessible when required by the authorized users.
Authenticity
Refers to the characteristic of a communication, document, or any data that ensures the quality of being genuine.
Active Attacks
Active attacks tamper with the data in transit or disturb communication or services between the systems to bypass or break into secured systems.
Adversary Behavioral Identification
Adversary behavioral identification involves the identification of the common methods or techniques followed by an adversary to launch attacks on or to penetrate an organization’s network.
Active Footprinting
Active footprinting involves gathering information about the target with direct interaction.
ARP Ping Scan
Attackers send ARP request probes to target hosts, and an ARP response indicates that the host is active.
ACK Flag Probe Scan
Attackers send TCP probe packets set with an ACK flag to a remote device, and then analyze the header information (TTL and WINDOW field) of received RST packets to determine if the port is open or closed.
Anonymizer
An anonymizer is an intermediate server placed between you as the end user and the website to access the website on your behalf and make your web surfing activities untraceable.
Audio Steganography
Audio steganography refers to hiding secret information in audio files such as .MP3, .RM, and .WAV.
Advanced Persistent Threats
Advanced persistent threats (APTs) are defined as a type of network attack, where an attacker gains unauthorized access to a target network and remains undetected for a long period of time.
Antivirus Sensor System
An antivirus sensor system is a collection of computer software that detects and analyzes malicious code threats such as viruses, worms, and Trojans.
Active Sniffing
Active sniffing involves injecting Address Resolution Packets (ARP) into the network to flood the switch’s Content Addressable Memory (CAM) table, which keeps track of host-port connections.
Address Resolution Protocol (ARP)
Address Resolution Protocol (ARP) is a stateless protocol used for resolving IP addresses to machine (MAC) addresses.
ARP Spoofing Attack
ARP spoofing involves constructing many forged ARP request and reply packets to overload the switch.
Application Level Hijacking
Application level hijacking refers to gaining control over the HTTP’s user session by obtaining the session IDs.
Anomaly Detection
It detects the intrusion based on the fixed behavioral characteristics of the users and components in a computer system.
Application-Level Firewall
Application-level gateways (proxies) can filter packets at the application layer of the OSI model (or the application layer of TCP/IP).
Application Proxy
An application-level proxy works as a proxy server and filters connections for specific services.
API DDoS Attack
The DDoS attack involves saturating an API with a huge volume of traffic from multiple infected computers (botnet) to delay API services to legitimate users.
Automated Web App Security Testing
It is a technique employed for automating the testing process. These testing methods and procedures are incorporated into each stage of development to report feedback constantly.
Application Whitelisting
Application whitelisting contains a list of application components such as software libraries, plugins, extensions, and configuration files, which can be permitted to execute in the system.
Application Blacklisting
Application blacklisting contains a list of malicious applications or software that are not permitted to be executed in the system or the network.
Access point (AP)
An AP is used to connect wireless devices to a wireless/wired network.
Association
It refers to the process of connecting a wireless device to an AP.
Agent Smith Attack
Agent Smith attacks are carried out by luring victims into downloading and installing malicious apps designed and published by attackers in the form of games, photo editors, or other attractive tools from third-party app stores such as 9Apps.
:
Android Rooting
Rooting process involves exploiting security vulnerabilities in the device firmware and copying the SU binary to a location in the current process’s PATH (e.g., /system/xbin/su) and granting it executable permissions with the chmod command.
Asymmetric Encryption
Asymmetric encryption (public-key) uses different encryption keys, which are called public and private keys for encryption and decryption, respectively.
Advanced Encryption Standard (AES)
The Advanced Encryption Standard (AES) is a National Institute of Standards and Technology (NIST) specification for the encryption of electronic data.