cybersecurity_flashcards_sections_7_to_12
What is Web Application Security?
Protecting web apps from attacks and data breaches.
What is OWASP Top 10?
A list of the most critical web application security risks.
What is a Web Shell?
A script that allows remote control of a server.
What is Remote Code Execution (RCE)?
Executing commands on a remote system.
What is WAF Bypass?
Evading Web Application Firewall protections.
What is Wireless Security?
Securing Wi-Fi networks from unauthorized access.
What is WEP/WPA/WPA2 Cracking?
Breaking Wi-Fi passwords using various encryption weaknesses.
What is a Rogue Access Point?
An unauthorized Wi-Fi device mimicking a legitimate one.
What is an Evil Twin Attack?
A fake Wi-Fi network that tricks users into connecting.
What is Mobile App Security Testing?
Checking mobile apps for vulnerabilities.
What are Bluetooth & NFC Risks?
Potential for unauthorized access and data theft via wireless tech.
What are Types of Malware?
Viruses, Worms, Trojans, Ransomware, etc.
What is Static Malware Analysis?
Examining malware without running it.
What is Dynamic Malware Analysis?
Observing malware behavior by running it in a safe environment.
What is IDA or Ghidra?
Tools used for reverse engineering malware.
What is Sandboxing?
Running malware in isolation to study its behavior.
What is a Payload?
Part of malware that performs the attack.
What are Cloud Security Risks?
Misconfigurations, data breaches, insecure APIs.
What is Cloud Penetration Testing?
Testing cloud services for vulnerabilities.
What is Cryptography?
Securing data using encryption techniques.
What is the Zero Trust Model?
Security approach that trusts no one by default.
What is an APT?
Advanced Persistent Threat – stealthy, ongoing cyberattack.
What is Digital Forensics?
Recovering and investigating data from digital devices.
What is Digital Evidence?
Data collected for use in investigations.