Chapter 0 Random Terms Flashcards

1
Q

Security Engineering

A

Security Engineering is focused on the security aspects in the design of systems that need to be able to deal robustly with possible sources of disruption, ranging from natural disasters to malicious acts.

You want to have the ability to think “outside the box” and envision new strategies & potential attacks before they are used against you.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Engineer

A

Someone who builds, designs, & maintains engines, machines, or structures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Information Systems

A

bridges business & computer science (study & use of computers). It encompasses systems, people, & processes that create, store, & distribute information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Network

A

a group of 2 or more computers joined together to communicate by exchanging information & sharing resources

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Internet

A

global communiation NW used to connect & share information between billions of computers worldwide

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Information Technology

A

a subet of Information Systems. It is the study, design, implementation, & support of computer-based information systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Difference between IS & IT

A

IS is a large umbrella and IT falls under that umbrella, It has nothing to do with systems per say, IT deals with the technology involved in the sytems themselves, the study, design, implementation, & support of those technologies. So an analology would be taking a paper & pencil. The two objects themselves are tools or information technologies, if we combine them into a system for writing, it becomes an information system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

IP

A

The internet protocol is the protocol by which data is sent from one computer to another on the internet; Each computer is known as a host on the internet & has at least one IP address that uniquely identifies it from all other computers on the internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Kernel

A

a computer program that manages I/O requests from SW, and translates them into data processing instructiosn for the CPU (brain) & other electronics of a computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Why is what you do important? + Hacker + the old joke

A

an attacker may gather sensitive information of organization if the security is not strong. He or she may then use that sensitive information to hack or break into the organizatoin’s NW. If an attacker breaks into the organization, then the organization potentially faces huge losses in terms of information, service, and finance

The term hacker is the most misunderstood & overused term in security industry, it is almost equivalent to the boogeyman, in which most people fear or choose to ignore.

The old joke is that companies & governments build vault doors on tents & the best exploits ignore the door & go in the back of the tent & we as pen testers and security engineers want to be able to stop that.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

VPN

A

a NW that uses public telecommunication infrastructure such as the internet to provide individual users or remote offices secure access to their organization’s NW

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Subdomain

A

is a domain that is a child of a parent domain.

i.e. support.oriyano.com is subdomain of oriyano.com

useful bc they can clue in to projects or other stuff goign on

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Extranet

A

a computer network that allows controlled access from outside of an organization’s intranet. Extranets are used for specific use cases including business-to-business (B2B).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

MAC address

A

unique identifier for NW interfaces for communication on physical NW segment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

RPC

A

Remote Procedure Call - a protocol used to request a servuce from a program located on another computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

phishing

A

defrauding by posing as legitimate source

17
Q

Collision Domain

A

A collision domain is a section of a network where data packets can collide with one another when being sent on a shared medium