Basic Terminology Flashcards
Used to refer to a list of banned IP addresses, applications or users.
Blacklist
The exact opposite of a blacklist
Whitelist
The process of creating a fake online profile in order to trick people into believing they are someone else for financial gain.
Cat fishing
The process of proving an individual is who they claim to be.
Authentication
The activity of analyzing and/or searching through data in order to find items of relevance, significance or value
Data Mining
This is used to describe a threat that is unknown to security specialists and has not been addressed.
Zero Day
This refers to the likelihood of something bad happening. It requires both a threat and a vulnerability to exist.
Risk
These are weaknesses within a system or network that can be exploited to cause us harm.
Vulnerabilities
A clearly defined way to breach the security of a system.
Exploit
This generally refers to anything that has the potential to cause our data, systems and networks harm.
Threat
This describes a target that may attract an above average level of attention from an attacker.
Hack Value
This is the concept that once an action is carried out by a party it cannot be denied by that same party.
Non-Repudiation
A malicious code that is only triggered when a set of conditions are met
Logic Bomb
A set of rules that determine how computers communicate with each otther. Also govern how an internet document gets transmitted to a computer screen. It determines what part ofthe converstation comes at which time and how the converstation ends
Protocol
Determines how browers and web servers communicate. Major protocol for the internet. The connection is dropped once the request has been made - “stateless system”
HTTP (Hyper Text Transfer Protocol)
The connection is dropped once the request has been made. Only is active when trying to connect to a web server
Stateless System
Secure Version of HTTP
HTTPS (Hyper Text Transfer Protocol Secured)
Used by HTTPS to provide encryption
SSL - Secure Sockets Layer
Used specifically by programmers and network administrators
SSH - Secure Shell
Governes how files are transmitted from one computer to another
FTP - File Transfer Protocol
Governes how files are transmitted from one computer to another that is secure.
SFTP - Secure File Transfer Protocol
Controls how internet messages are sent
IMAP - Internet Message Access Protocol
Governs how emails are sent and received
SMPT - Simple Mail Transfer Protocol
Pieces of text that are stored on your hard disks and then later retrieve it. Their purpose is to identify a user, check for their past activity on the website and use this record to provide the most relevant information to the user
Web Cookies
Can store your shopping cart on e-commerce sites
Session Cookies
Divides a message or file into packets that are transmitted over the internet and then reassembled when destination is reached
TCP - Transmisison Control Protocol
Responsible for the address of each packet so it is sent to the correct destination
IP - Internet Protocol
A suite of protocols used to interconnect network devices on the internet. Divided into 4 major layers
TCP/IP
Consists of protocls that operate on a link that connects hosts on a network e.g Ethernet - 1 of the major layers of TCP/IP
Datalink Layer
Connects independent networks together, this is where you have IP itself - 1 of the major layers of TCP/IP
Internet/Networking Layer
Handles communication between hosts, this is where the TCP is located - 1 of the major layers of TCP/IP
Transport Layer
Standardizes data exchange for applications e.g HTTP, FTP - 1 of the major layers of TCP/IP
Application Layer