Final Exam Flashcards
These enforce a series of rules defining
what kind of network traffic is allowed and
what is not allowed
Firewall
The act of verifying the identity of a particular person
Authentication
Difference between a threat and an attack
Threat is a potential and does not need to have occured
Three goals of security
Prevention, Detection, Recovery
Why anti-virus is not perfect
1) Zero-day attacks, 2) based on signatures for KNOWN malware (lots of variants)
Occurs when a malicious user utilizes a vulnerable web app to send malicious code to a different end user
XSS
cross-site scripting, a type of injection
This part of the operating system creates and manages files and directories
File system
Standard of proof in a criminal case vs a civil case
Criminal: beyond a reasonable doubt
Civil: preponderance of the evidence (AKA more likely than not)
What are 4 ways malware can get onto a system
flashdrives, spam email, emails from infected friends/contacts, malicious websites, infected websites, infected computers on a network
password are stored on a system as these, which vary based on a operating system
Also, how does a system authenticate a user password attempt
Hashes
The system hashes the attempt and compares the calculated hash to the stored hash
What is the California Security Breach Act and its importance
Requires organizations that maintain personal identifiable information to inform customers about data breaches
Important bc if you work in security industry, there are notification requirements and guidelines (state governed)
Systems on a network that includes files and/or progams in use by multiple people on or outside a network
Servers
Sets of devices, software, and cables that enables the exchange of information
Network
Describe two network topologies
Bus - Every component is connected to a single line, with “taps” for each
component
Advantages: quick to deploy, cheap
■ Disadvantage: lots of collisions, unreliable, a break in the line causes
the network to fail, performance is directly related to number of
components and usage
■ Example: Cable internet
Ring - Every component has 2
connections – a left and a right
side
■ Basically a bus with a
connection back around to
the beginning
■ Disadvantages:
Performance is generally
poor, not scalable, break in
one connection causes
complete network failure
Star
● Each node is connected to a
central point
● Most common physical topology
(Ethernet)
● Advantages: fast, non-central
failure does not bring down the
network, scalable
● Disadvantages: used to be very
expensive, but not anymore,
single point of failure, lots of
cabling
Mesh
● Advantages: self-healing, failure
tolerant, potentially fast
● Disadvantages: no known route
traversal, difficult to control and
filter traffic
● Example: Wireless ad-hoc
network
This device inspects the data of a packet to see if it is malicious in nature
IDS
What was the first operating system & service pack to include a firewall enabled by default
Windows XP SP2
Any program that is hidden within another
Trojan
What is CIA and why is it important?
“Confidentiality
Only those with sufficient privileges and a demonstrated need may access certain information
Integrity
Quality or state of being whole, complete, or uncorrupted
Availability
Enables user to access information without interference or obstruction and in a useable format
Traits of well-implemented security”
What happens when there is not enough RAM for memory
Virtual memory - aka pagefile or swapfile
Paging allows for memory to be “swapped” out to the hard disk when there is not enough RAM to hold everything attempting to be stored
Inserting code into a web app when it should be processing data
Code injection
This model is a set of guidelines used to standardize network processes
What are the layers
OSI or TCP/IP
7) Application
6) Presentation
5) Session
4) Transport
3) Network
2) Data Link
1) Physical
Examples of layer 6 of the OSI model, presentation
.doc, .jpg
Smallest unit of processing that can be scheduled
Thread
The act of luring a victim to divulge his/her personal or financial info
Phishing
An executable set of code
Program