Chapter 4 - Security Flashcards

1
Q

Asymmetric key encryption

A

Encryption system in which 2 keys are used: a public key to encrypt data and a private key to decrypt it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Backdoor

A

Method of bypassing security in a system, built in by the system designers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Biometric Enrolment

A

Process of registering users for biometric systems by taking initial samples.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Biometric Template

A

Measurements taken from a biometric sample.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Botnet

A

Group of zombie computers under the control of a criminal.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Brute Force Attack

A

Attempt to break a password by trying all possible combinations of letters, numbers and symbols.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Certificate Authority

A

Organisation that issues digital certificates to individuals and companies.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Ciphertext

A

Result of encrypting plaintext

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Computer Misuse Act

A

UK law governing criminal offences committed using a computer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Dictionary Attack

A

Attempt of breaking in by trying all possible words.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

DDoS

A

Distributed Denial of Service Attack

Denial of service attack committed using dozens of computers, usually zombie computers on a bonnet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

DNS poisoning

A

Technique used by criminals to alter DNS records and drive users to fake sites, to commit phishing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

EV SSL

A

Extended Validation SSL. Digital certificate validation technique used on the World Wide Web.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Key escrow

A

Idea of having encryption keys stored by third party companies so that the government can access them if needed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Key pair

A

A public and private key that work together in a public encryption system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Macro virus

A

Virus that takes advantage of the macro programming languages built into some software.

17
Q

Packet Sniffer

A

Software or hardware used to collect data travelling over a network.

18
Q

Pharming

A

Technique used by criminals to alter DNS records and drive users to fake sites, to commit phishing.

19
Q

Rootkit

A

Type of malware that infiltrates the OS and attempts to hide itself from view.

20
Q

Secret Key Encryption

A

Encryption system in which a single key is used for both encryption and decryption.

21
Q

Security Token

A

Hardware device that must be present during login to authenticate a user.

22
Q

Smishing

A

Phishing attacks using SMS.

23
Q

Social Engineering

A

Tricking a user into revealing their password or other sensitive data.

24
Q

Spam bot

A

Program that scans webpages for email addresses in order to send spam.