Definitions Flashcards
Threats
Potential for violation of security, which exists when there is a circumstance, capability, action, or event that could breach security and cause harm.
Threat is a possible danger that exploits a vulnerability.
Attack
An assault on system security that derives from an intelligent threat; that is, an intelligent act that is a deliberate attempt to evade security services and violate the security policy of a system
The actual action. They already compromised the vulnerability.
Active Attack
Attempts to alter system resources
Passive Attack
learn or make use of information from system
Cybersecurity
Defending computers, servers from malicious attacks
Cyber Defense
Setting up your system where it’s resilient to attacks
Information Security
prevention of unauthorized access during time of storing or transferring from one to another
Virus
merges to other programs and files
modifies programs and files
Worm
self-replicate and use an infected computer to infect others
Spyware
spy software
adware
show different ads on screen
trojan
camoflaged harmless file but then works as gateway to access system
ransomware
hacker encrypts files and payment is required to unlock
Denial of service
flooding network with traffic
non repudiation
prevent sender or receiver from denying transmitted message
_______ are a chain of a large number of devices connected to the Internet that help attackers to control victim machine
Botnets
Phishing attacks includes:
Fraud and Evil Twin
Message authentication is a service beyond ______
Message integrity
In message signing, transmitted message is encrypted using ____
sender
digital signature needs a ________ for encryption
Public-key algorithm
hash function guarantees integrity of a message. It guarantees that message has not been _______
Changed/modified
sender must not be able to deny sending a message that was sent, is known as
Message nonrepudiation
symmetric key encryption uses _____
Only One Key
HTTP connection uses port __ whereas HTTPS uses port ___ and invokes SSL
80, 443
an event that appears to be a risk but turns out not to be one is called a ____
false positive
Security risk of P2P network
virus can be quickly transmitted
FTP uses which 2 ports
20 and 21
format of data of transport layer
Segment
format of data of data link layer
frames