Final Exam (Not Including Midterm Material) Flashcards

1
Q

Security

A

Focused on external threats, unlike protection, which is focuses on internal concerns

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Breach of Confidentiality

A

Information is no longer secret

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Breach of integrity

A

Information may have been changed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Breach of availability

A

System/information may not be available

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

theft of service

A

Using a service that the user should not be allowed to

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

denial of service

A

An attack that makes it so that the system cannot complete services

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

masquerading

A

An unauthorized user claiming to be a user that is authorized

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

authentication

A

an attempt to verify that a user or
message is what it claims to be

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

replay attack

A

Retransmitting the previously transmitted password to try to get authenticated

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

message modification

A

When an attacker changes the contents of a message from an authenticated user

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

man-in-the-middle attack

A

Attacker intercepts messages from both parties and pretends to be the person they want to communicate with

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

session hijacking

A

After a user is authenticated, another user cuts them off and communicates in their name

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

privilege escalation

A

The enabling of more privileges than an entity (process, system, person) should have

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Trojan horse

A

A program that acts in a clandestine or malicious manner rather than simply performing its stated function

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

trap door

A

A back-door daemon left behind after a
successful attack to allow continued access by the
attacker.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

logic bomb

A

A remote-access tool designed to
operate only when a specific set of logical conditions is met

17
Q

stack/buffer overflow

A

Adding a long too many items to a stack or a buffer to overwrite or get access to other parts of memory

18
Q

virus

A

A fragment of code embedded in a legitimate program that, when executed, can replicate
itself; may modify or destroy fi les and cause system crashes and program malfunctions.

19
Q

attack surface

A

The amount of the program that is vulnerable to attacks

20
Q

worm

A

A program that spreads malware between
computers without intervention from humans

21
Q

port scanning

A

A program that spreads malware between
computers without intervention from humans

22
Q

zombie system

A

Compromised systems that
are being used by attackers without the owners’
knowledge.

23
Q

distributed denial-of-service attack

A

a malicious attempt to disrupt the normal traffic of a targeted server, service or network by overwhelming the target or its surrounding infrastructure with a flood of Internet traffic.

24
Q

encryption

A

Turning plaintext into something that
looks like random garbage (ciphertext ), using a
key

25
key
A sequence of symbols used to convert plaintext into cyphertext and back again
26
symmetric encryption
The same key is used to encrypt and decrypt a message
27
block cipher
Cyphers are encrypted in blocks. Can be unsafe because the same message will be encrypted the same way
28
cipher-block chaining
Like a block cypher, but combines the block with the previous block to avoid the same message being encrypted the same way
29
stream cipher
Encrypts bytes as they are sent, instead of in blocks
30
asymmetric encryption
Uses a key pair. Encryption key is different than decryption key.
31
private key
32
public key
A key that is kept secret
33
(secure) hash function
Turning a large message into a smaller hashed function
34
message digest
a fixed size numeric representation of the contents of a message, computed by a hash function
35
digital signature
An encrypted signature proving the authenticity of a document
36
password
A secret message used to get access to a system
37
one-time password
A password that can only be used once