Chapter 4 - Security Flashcards
Asymmetric key encryption
Encryption system in which 2 keys are used: a public key to encrypt data and a private key to decrypt it.
Backdoor
Method of bypassing security in a system, built in by the system designers.
Biometric Enrolment
Process of registering users for biometric systems by taking initial samples.
Biometric Template
Measurements taken from a biometric sample.
Botnet
Group of zombie computers under the control of a criminal.
Brute Force Attack
Attempt to break a password by trying all possible combinations of letters, numbers and symbols.
Certificate Authority
Organisation that issues digital certificates to individuals and companies.
Ciphertext
Result of encrypting plaintext
Computer Misuse Act
UK law governing criminal offences committed using a computer.
Dictionary Attack
Attempt of breaking in by trying all possible words.
DDoS
Distributed Denial of Service Attack
Denial of service attack committed using dozens of computers, usually zombie computers on a bonnet.
DNS poisoning
Technique used by criminals to alter DNS records and drive users to fake sites, to commit phishing.
EV SSL
Extended Validation SSL. Digital certificate validation technique used on the World Wide Web.
Key escrow
Idea of having encryption keys stored by third party companies so that the government can access them if needed.
Key pair
A public and private key that work together in a public encryption system.
Macro virus
Virus that takes advantage of the macro programming languages built into some software.
Packet Sniffer
Software or hardware used to collect data travelling over a network.
Pharming
Technique used by criminals to alter DNS records and drive users to fake sites, to commit phishing.
Rootkit
Type of malware that infiltrates the OS and attempts to hide itself from view.
Secret Key Encryption
Encryption system in which a single key is used for both encryption and decryption.
Security Token
Hardware device that must be present during login to authenticate a user.
Smishing
Phishing attacks using SMS.
Social Engineering
Tricking a user into revealing their password or other sensitive data.
Spam bot
Program that scans webpages for email addresses in order to send spam.