Exam 2 Flashcards
Internet
network of computers/similar devices throughout the world
World Wide Web
collection of pages (digital documents of content)
Man-in-the-browser
can utilize anything a user inputs into a browser
Keystroke Logger
hardware/software that records user keystrokes
Page-in-the-middle
the user is redirected to another page
Download Substitution
user installs malicious code instead of/in addition to their intended download
Website Defacement
when an attacker replaces/modifies content of a website
Fake Website
A copy of a real website (like a bank webpage) that looks realistic, so users enter information willingly
Integrity Checksum
Can detect altered content on a website
Signed code or data
a digital signature on code, vouching its authenticity
Web Bug
a tiny image loaded on a website, letting its owner know of its display on another user’s screen
Click Jacking
Disguising what a link actually leads to
Least Privilege
giving people access to as few resources as necessary
Multiprogrammed Operating Systems
a monitor overseeing each program’s execution
Multitasking Operating Systems
allows multiple users to perform multiple tasks at the same time
Hook (as in Hook into an operating system)
be incorporated into an operating system
Audit Logs
a record of who accessed what and how
Virtual Machine
operating system offering user only what they need to see, and nothing else
Trusted System
a system with evidence to support the claim it uses a function or policy
Root
highest privilege user
Routing
when a device figures out how best to forward along data
Induction
tapping a wire and reading the radiation signals
OSI model (know the definition, not all layers)
a virtual concept of computer network communications
MAC address
unique identifier of a network interface card that connects a computer and a network
802.11n
wifi 4: range: 1000 ft. what most wifi-enabled computers communicate on
WPA3
the upgraded version of wifi protected access
Denial of Service
preventing availability to resources
Flooding Attack
sending more requests/demands then what the system can handle
Ping of Death
a flood attack using ping
Distributed Denial of Service
marshalls many forces on the attack side, using bots
Link Encryption
data is encrypted just before the system places them on the physical communications link
Onion Routing
sending data through multiple hosts, so they only know who they got it from and who they’re sending it to
Virtual Private Network
simulates the security of a dedicated protected communication line on a shared network
Firewall
a device whose purpose is to block bad things
Protected Subnet
the computers that aren’t visible to the outside network
Default Permit (in firewalls)
“That which is not expressly forbidden is permitted”
Default Deny (in firewalls)
“That which is not expressly permitted is forbidden”
DMZ
(Demilitarized Zone) The part of a network that’s exposed to the larger internet network
NAT
(Network address translation) Mapping multiple private addresses inside a local network to a public IP address before transferring the info to the internet