Deck D Prt. 1 Flashcards
Asymmetric Cryptography
Is Computationally Expensive in Comparison with Symmetric Encryption. However, it is well Suited to Securely Negotiate Keys for use with Symmetric Cryptography
Audit Feature
Determining The Impact of Enabling the AUDIT Feature on a Server should be the First Step to take Before you Enable Audit Feature.
BBProxy
Is Used for Blackjacking Attack in which the Attacker Could Circumvent Perimeter Defenses and Gain Access. Blackjacking is a TECHNIQUE Used to Connect Internally to a Corporate Network using a Typical BES Device
Backups
To SECURE the Backups Tapes in Transit, You Should Encrypted the Backup Tapes and Transport Them in a Lock Box.
Biometric Processing
Is the Amount of Time it takes to be Either Accepted or Rejected from when an Individual Provides Identification and Authentication Information.
Botnet Attack
Is Easy to Spot when you see Large Number of OUTBOUND Connections and Internal IP is Communicating with a Blacklisted Public IP
Brute Force
Method of Password Cracking Takes the Most time and Effort
C++
Programming Languages is most susceptible to buffer Overflow Attacks, due to its Lack of Build in Bounds Checking Mechanism
Clickjacking Attack
Occurs when the USER thinks He/She is clicking on a NORMAL URL but actually He/She Clicks on the content or URL that exists in the Transparent “Iframe” which is setup by the Attacker.
Counter Based Authentication System
A Counter Based Authentication System is an Authentication System that Creates ONE TIME PASSWORDS that are Encrypted with Secret Keys
DNS Spoofing
Occurs when that attackers Gain Access to the DNS Server and redirect the direction of a website like www.google.com to their OWN IP ADDRESS
Digital Signature
Two Important Conditions of a Digital Signature is that is Has to be Unforgeable and has to be Authentic.
ESP Transport Mode
ESP(Encapsulating Security Payload) Transport Mode is the Mode of IPSEC that Provides you with Security and Confidentiality of Data Within the Same LAN(NETWORK)
Encryption Protocols
Using ENCRYPTION Protocols to Secure Network Communications is the Vest way to Defend Against Network Sniffing.
Bettercap
Is a TOOL that is USED by ATTACKERS to inject HTML Code to Embed Malicious Applets into HTTP Connections Using A Rogue wireless AP in Order to carry out an MITM Attack and Inject an HTML Code to Embed a Malicious Applet in all HTTP Connections.