Cyber terminology Flashcards

1
Q

a group of computers that is networked together and used by hackers to steal information

A

Botnet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Definition of cyber security

A

the technologies and procedures intended to safeguard computers, networks and data from unlawful access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Principal of protecting sensitive information against access and disclosure to unauthorised entities, either intentionally or unintentionally.

A

Confidentiality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Principle of protecting information against improper modification. It is the accuracy, consistency, and trustworthiness of data during its entire life cycle. Related to the originality of the data.

A

Integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Assurance that the systems responsible for delivering, storing, and processing information are accessible when needed, by those who need them.

A

Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which CIA triad was breached when they stole bank data and customers personal identification in the US target case?

A

Confidentiality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

The mechanism of verifying the identity of a user to prevent unauthorised access

A

Authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

The services which determine which r4esouces are accessed, when and by who

A

Authorisation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Keeping track of what users do, including what they access, the amount of time they access resources and any changes made

A

Accounting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Identification

A

determines the true identity of a user in relation to the authentication, authorisation and accounting system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Non-repudiation

A

protects against denial by one of the parties in a communication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Peers if they implement the same protocol in different systems

A

Peer-entity authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Data-origin authentication

A

Corroborates the sources of the data unit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Access control

A

limit and control access via communications links

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Data confidentiality

A

protection of transmitted data from passive attacks and the protection of traffic flow from analysis.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Data integrity

A

total stream protection. Service can be with or without recovery

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Keyless algorithm

A

cryptographic hash function which turns a variable amount of text into a small, fixed-length value (AKA hash value, hash code , digest)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Symmetric encryption algorithms

A

Encryption algorithms which use a single key (block or stream cypher) Also MAC (message authentication code)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Communications security

A

network protocols (IPsec, IEEE 802.11i WIFI, TSL, SSH)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

the minimum necessary access that is required should be assigned for the shortest duration necessary. Automated privilege relinquish system and reassigning privilege after a set time.

A

Least privilege

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

‘security through obscurity’ doesn’t work. Alternatively, an open design gets assurance from many potential critics, so more chance to improve. Some secrecy is necessary, though make these secrets replaceable data rather than the algorithm itself. E.g. cryptographic keys

A

Open design

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

implementation of security in layers. Establish multiple layers of security controls and safeguards. Rather than establishing a control measure only at the entry point, better to have control measures at every critical point.

A

Defence in depth

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

an access authorisation scheme in which a subject’s right to access an object takes into consideration not just a privilege level but also the relevance of the data involved in the role the subject plays (or the job they perform)

A

Need to know

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

builds on the principle of least privilege. It requires the use of granular access permissions. For each type of privileged operation, there should be different roles in the system. It will ensure that the subject is only getting the essential roles and privileges

A

Separation of duties

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

the system should consist of a secure state where only certain essential operations can be performed , and all access are blocked. In an event of failure, the system should fall back to the secure state allowing only the essential tasks to repair and monitor the system.

A

Fail secure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

the security mechanism should be as simple as possible. Complex system design makes it harder to audit and errors can easily be overlooked. In a simplified system, it is easier to audit, find errors and resolve them, So the system should be sufficiently small and simple to be verified and implemented

A

economy of mechanism

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

every access to every object must be checked for security and efficiency. Whenever a subject attempts to access an object , the system must check for privileges, of the action is permitted, the system will allow access, otherwise block access

A

Complete mediation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

minimise the number of mechanisms common to more than one user and depended on by all users, Every shared mechanism is a potential information path so shared mechanisms should be minimised for granular control.

A

Least common mechanism

29
Q

the user interface must be easy to use so that users routinely and automatically apply the mechanisms correctly. Otherwise they will be bypassed. Security mechanisms should not add to the difficulty of accessing resources.

A

Psychologically acceptable

30
Q

weakest point of a system should be identifies and reinforced. Often the least valuable resources or privileges are not secured properly and as a result, they turn into a weak link in the system security, The security of a system is as strong as the weakest link in it. So, this type of weak point should be identified, treated properly and eliminated

A

Weakest link

31
Q

in a system, existing code or functionality should be reused when possible, this ensures that the attack surface is kept to a minimum by not introducing new vulnerabilities when adding new code to the system.

A

Leveraging existing components

32
Q

Advertising that is integrated into software. It results in pop-up ads or redirection of a browser to a commercial site.

A

Adware

33
Q

A malicious hacker tool used to break into new machines remotely.

A

Auto-rooter

34
Q

Any mechanisms that bypass a normal security check; it may allow unauthorised access to functionality.

A

Backdoor/ trapdoor

35
Q

Insertion of malicious code by exploiting an injection flaw.

A

Code injection

36
Q

A deliberate act through cyberspace to manipulate, disrupt, deny, degrade or destroy computers or networks, or the information resident on them, with the effect of seriously compromising national security, stability or economic prosperity.

A

Cyber attack

37
Q

An attack that prevents authorised access to resources or the delaying of time-critical operations.

A

Denial of service attack (DoS)

38
Q

A DoS technique that uses numerous hosts to perform the attack.

A

Distributed denial of service attack (DDoS)

39
Q

Attacks that encompass a variety of exploits that subvert the functioning of the Domain Name System (DNS), which provides a mapping between hostnames and IP addresses.

A

DNS attack

40
Q

A program that installs other items on a machine that is under attack. Usually, a downloader is sent in an email.

A

Downloader

41
Q

An installer that surreptitiously carries malware to be executed on the compromised machine. They are often disguised and hidden in a computer’s directories, so that although they are visible, they look like valid programs or file types.

A

Dropper

42
Q

Pre-packaged software made available for use by others that uses an arsenal of exploits to infect a computer. Then it typically installs malware.

A

Exploit kit

43
Q

A program that is used to attack networked computer systems with a large volume of traffic to carry out a DoS attack.

A

Flooder

44
Q

Software that captures keystrokes on a compromised system.

A

Keylogger

45
Q

A set of tools for generating new viruses automatically.

A

Kit (virus generator)

46
Q

A program inserted into software by an intruder. A logic bomb lies dormant until a predefined condition is met; the program then triggers an unauthorised act.

A

Logic bomb

47
Q

Software (for example, scripts, macros, or other portable instructions) that are shipped unchanged to a heterogeneous collection of platforms and execute with identical semantics.

A

Mobile code

48
Q

A method of accessing an obstructed device, using one of various methods, by capturing the user ID/password of a validated user.

A

Password attack

49
Q

A digital form of social engineering that uses authentic-looking, but bogus, emails to request information from users or direct them to a fake website that requests information.

A

Phishing

50
Q

A type of malware that tries to extract a ransom payment in exchange for unblocking access to an asset that belongs to the victim or in exchange for a promise not to release the data captured by the ransomware.

A

Ransomware

51
Q

Attacks made across the Internet or a corporate network.

A

Remote access attacks

52
Q

A set of hacker tools used after an attacker has broken into a computer system and gained root-level access.

A

Rootkit

53
Q

A derisive term used to describe an unskilled individual that uses existing computer scripts or programs to hack computers, networks or websites, lacking the expertise to write their own.

A

Script kiddie

54
Q

A general term for attackers trying to trick people into revealing sensitive information or performing certain actions, such as downloading and executing files that appear to be benign but are actually malicious.

A

Social engineering

55
Q

Software that collects information from a computer and transmits it to another system.

A

Spyware

56
Q

A private actor that conducts activity on behalf of a state, for example, a contracted hacker or company.

A

State-sponsored actor

57
Q

An entity that is partially or wholly responsible for an incident that impacts – or has the potential to impact – an organisation’s security. Also referred to as a malicious actor. Malicious actors can be categorised as cyber-criminals, hacktivists, malicious insiders etc.

A

Threat actor

58
Q

A computer program that appears to have a useful function but also has a hidden and potentially malicious function that evades security mechanisms, sometimes by exploiting legitimate authorisations of a system entity that invokes the Trojan horse program.

A

Trojan horse

59
Q

Malware that, when executed, tries to replicate itself into other executable code; when it succeeds, the code is said to be infected. When the infected code is executed, the virus also executes.

A

Virus

60
Q

An attack that inserts malicious code on a web server, either to attack the server itself or as a means of attacking source systems of users who access the website.

A

An attack that inserts malicious code on a web server, either to attack the server itself or as a means of attacking source systems of users who access the website.

61
Q

A computer program that runs independently and propagates a complete working version of itself onto other hosts on a network.

A

Worm

62
Q

A program activated on an infected machine that launches attacks on other machines.

A

zombie or bot

63
Q

allows you to create an encrypted ‘tunnel’ to the end point. However you need to trust the VPN service. If it’s a foreign service, how do you know they are doing the right thing?

A

VPN

64
Q

not safe for sensitive materials. Safety depends on encryption, passwords provide limited security.

A

Public WIFI

65
Q

Can turning your phone GPS function on your phone prevent tracking?

A

No. Our phones are designed to download from satellites. Our phones don’t send information back to the satellites, so the satellites don’t track you. WIFI can track you, cell towers can track you.

66
Q

An attacker sends a specially crafted malicious link (such as ads) to a
victim containing JS and entices them to click on it. When the user
clicks on the link, their browser sends a request to a vulnerable
website that contains JS, and the vulnerable site displays the JS in the
page retrieved by the browser. And then the JS executes in the
browser.

A

Reflected XSS

67
Q

A malicious user may store the JavaScript commands in a server-site
database, and then be rendered by any future clients that access the
page and display the contents of the database. This type of XSS
attack is common on websites that allow users to store data, like
Forums, Wikis, and comments pages on shopping websites.

A

Stored XSS

68
Q

AAA stands for…

A

Authentication, authorisation, accounting