Cards #101 - 150 Flashcards
Cryptographic keys
used in encrypting and decrypting information, there are private keys and public keys
Cryptography
science of writing on a secret code and is an ancient art
Cyber bullying
any online behavior that embarrasses or hurts feelings
DAC (Discretionary Access Control)
a person has complete control over the object that it owns and the programs that it executes
Data driven attack
a form of attack that is encoded in seemingly innocuous data which is executed by a user or a process to implement an attack
Data integrity
when automated data is the same as in the source documents (has not been exposed to alternation or destruction)
Digital signature
a way to verify that an email message is really from the person who supposedly sent it and that it hasn’t been changed (has a public key and a private key)
Deceiving
giving a false impression, lying
Defense against IP spoofing
monitoring network for atypical activity
Spoofing
type of cyber attack that is used by hackers to gain access to computers and mine them for sensitive data
Demilitarized some (DMZ)
hosts of DMZ are typically web servers, email servers, and the alike, and are accessible for both internal and external users (allow user on the Internet to access the servers without accessing the organization’s internal network)
Denial of Service (DoS)
prevents legitimate users from using a service
DES-CBC
default cipher for the IPSec
Dial-Up
service whereby a computer terminal can use the telephone to initiate and effect communication with a computer
Dictionary attack
attack that uses brute-force technique of successively trying all the words in some large, exhaustive list
Differential backup
backups any files that have been altered since the last full backup
Direct action virus
a virus that takes instant action in your device usually spread by executable files
Directory Harvest Attack
an attempt to determine the valid e-mail addresses associated with an e-mail server so that they can be added to a spam database
Disasters can be categorized into tow broad categories :
Man-made and Electronic
Discretionary Access Control (DAC)
a means of restricting access to objects based on the identity of subjects and/or groups to which they belong
Floppy Disks
highly vulnerable to damage by magnetic fields and the environment. unsuitable for storing and archiving data compared to today’s alternative removable media
Distributed Denial of Service (DDoS)
when an attacker attacks from multiple source systems. Distributes trojan horses to PCs, zombies or slaves, an uses them to launch the attack
Distributed Tool
tool that can be distributed to multiple hosts, which can then be coordinated to anonymously perform an attack on the target host simultaneously after some time delay
Domain Name System (DNS) spoofing
assuming the DNS name of another system by either corrupting the name service cache of a victim system, or by compromising a domain name server for a valid domain
DSL
Digital Subscriber Line Internet connectivity. provides the user with dedicated bandwidth
Dumpster diving
going through trash bins to search for papers with employee and department names, administration codes, specifics about the companies network environment, and other useful information
Dynamic NAT
the router maintains a list of internal addresses and a list of external addresses that are dynamically mapped to each otehr
Email attachment
files sent with emails that may contain malware (may allow malicious code to enter a desktop)
Email bombs
large quantity of bulk email that overwhelms an email server preventing user access
Egress filters
ensures that packets with source address of the internal network cannot originate form a remote location
Encryption
a process of encoding messages to keep them secret, so only “authorized” parties (with secret key or password) can read it
EULA
End User License Agreement.
contract between you and the software’s vendor or developer.
Exception policy
provides the ability to exclude applications and processes from detection by the virus and spyware scans and by SONAR
Extranet
Similar to Intranet, but is accessible by two or more parties. When two companies/partners need to communicate and collaborate a lot, they connect their networks together. (like a sharepoint(?))
Fails over
refers to the process of reconstructing a system or switching over to other systems when a failure is detected
False Accept Rate
measures the likelihood that a user will claim a false identity and be accepted
False Acceptance
where an unauthorized user is identified as an authorized user
False Reject Rate
Measures the likelihood that a system will incorrectly deny the user
Faraday Cage
can be used to prevent interferences and emissions
Fast flux
DNS technique used by botnets to hide phasing and malware delivery sites behind an ever-changing network of comprised hosts acting as proxies
FAT virus
ruin your file allocation system (can also destroy files and entire directories for them)
Fault tolerance
primarily the ability of a system to sustain operations in the event of a component failure
FDE
Full Disk Encryption.
Automatically converts data on a hard drive into a form that cannot be understood by anyone who does not have the decryption key
Fiber Optics
allows for the longest distances and highest transmission speeds, and is the most secure type of network cabling
File infector virus
a virus that attaches itself to executable files. when the infected executable files runs, the virus copies itself to memory. later the virus attaches itself to other executable files
Firewall
part of a computer system that is designed to block unauthorized access
Firewall analyzer
helps network security administrators and IT managers for bandwidth monitoring and Firewall Internet security events monitoring efficiently
Firewall policy
an addition to security policy that describes how firewalls should handle application traffic (such as Web or email applications)
Flooding
type of incident involving insertion of a large volume of data resulting in denial of service
FTP
file transfer protocol.
used to upload or download files