Final Exam (Not Including Midterm Material) Flashcards
Security
Focused on external threats, unlike protection, which is focuses on internal concerns
Breach of Confidentiality
Information is no longer secret
Breach of integrity
Information may have been changed
Breach of availability
System/information may not be available
theft of service
Using a service that the user should not be allowed to
denial of service
An attack that makes it so that the system cannot complete services
masquerading
An unauthorized user claiming to be a user that is authorized
authentication
an attempt to verify that a user or
message is what it claims to be
replay attack
Retransmitting the previously transmitted password to try to get authenticated
message modification
When an attacker changes the contents of a message from an authenticated user
man-in-the-middle attack
Attacker intercepts messages from both parties and pretends to be the person they want to communicate with
session hijacking
After a user is authenticated, another user cuts them off and communicates in their name
privilege escalation
The enabling of more privileges than an entity (process, system, person) should have
Trojan horse
A program that acts in a clandestine or malicious manner rather than simply performing its stated function
trap door
A back-door daemon left behind after a
successful attack to allow continued access by the
attacker.