Basic Terminology Flashcards

1
Q

Used to refer to a list of banned IP addresses, applications or users.

A

Blacklist

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

The exact opposite of a blacklist

A

Whitelist

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

The process of creating a fake online profile in order to trick people into believing they are someone else for financial gain.

A

Cat fishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

The process of proving an individual is who they claim to be.

A

Authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

The activity of analyzing and/or searching through data in order to find items of relevance, significance or value

A

Data Mining

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

This is used to describe a threat that is unknown to security specialists and has not been addressed.

A

Zero Day

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

This refers to the likelihood of something bad happening. It requires both a threat and a vulnerability to exist.

A

Risk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

These are weaknesses within a system or network that can be exploited to cause us harm.

A

Vulnerabilities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A clearly defined way to breach the security of a system.

A

Exploit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

This generally refers to anything that has the potential to cause our data, systems and networks harm.

A

Threat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

This describes a target that may attract an above average level of attention from an attacker.

A

Hack Value

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

This is the concept that once an action is carried out by a party it cannot be denied by that same party.

A

Non-Repudiation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

A malicious code that is only triggered when a set of conditions are met

A

Logic Bomb

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

A set of rules that determine how computers communicate with each otther. Also govern how an internet document gets transmitted to a computer screen. It determines what part ofthe converstation comes at which time and how the converstation ends

A

Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Determines how browers and web servers communicate. Major protocol for the internet. The connection is dropped once the request has been made - “stateless system”

A

HTTP (Hyper Text Transfer Protocol)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

The connection is dropped once the request has been made. Only is active when trying to connect to a web server

A

Stateless System

17
Q

Secure Version of HTTP

A

HTTPS (Hyper Text Transfer Protocol Secured)

18
Q

Used by HTTPS to provide encryption

A

SSL - Secure Sockets Layer

19
Q

Used specifically by programmers and network administrators

A

SSH - Secure Shell

20
Q

Governes how files are transmitted from one computer to another

A

FTP - File Transfer Protocol

21
Q

Governes how files are transmitted from one computer to another that is secure.

A

SFTP - Secure File Transfer Protocol

22
Q

Controls how internet messages are sent

A

IMAP - Internet Message Access Protocol

23
Q

Governs how emails are sent and received

A

SMPT - Simple Mail Transfer Protocol

24
Q

Pieces of text that are stored on your hard disks and then later retrieve it. Their purpose is to identify a user, check for their past activity on the website and use this record to provide the most relevant information to the user

A

Web Cookies

25
Q

Can store your shopping cart on e-commerce sites

A

Session Cookies

26
Q

Divides a message or file into packets that are transmitted over the internet and then reassembled when destination is reached

A

TCP - Transmisison Control Protocol

27
Q

Responsible for the address of each packet so it is sent to the correct destination

A

IP - Internet Protocol

28
Q

A suite of protocols used to interconnect network devices on the internet. Divided into 4 major layers

29
Q

Consists of protocls that operate on a link that connects hosts on a network e.g Ethernet - 1 of the major layers of TCP/IP

A

Datalink Layer

30
Q

Connects independent networks together, this is where you have IP itself - 1 of the major layers of TCP/IP

A

Internet/Networking Layer

31
Q

Handles communication between hosts, this is where the TCP is located - 1 of the major layers of TCP/IP

A

Transport Layer

32
Q

Standardizes data exchange for applications e.g HTTP, FTP - 1 of the major layers of TCP/IP

A

Application Layer