Final Exam (Not Including Midterm Material) Flashcards
Security
Focused on external threats, unlike protection, which is focuses on internal concerns
Breach of Confidentiality
Information is no longer secret
Breach of integrity
Information may have been changed
Breach of availability
System/information may not be available
theft of service
Using a service that the user should not be allowed to
denial of service
An attack that makes it so that the system cannot complete services
masquerading
An unauthorized user claiming to be a user that is authorized
authentication
an attempt to verify that a user or
message is what it claims to be
replay attack
Retransmitting the previously transmitted password to try to get authenticated
message modification
When an attacker changes the contents of a message from an authenticated user
man-in-the-middle attack
Attacker intercepts messages from both parties and pretends to be the person they want to communicate with
session hijacking
After a user is authenticated, another user cuts them off and communicates in their name
privilege escalation
The enabling of more privileges than an entity (process, system, person) should have
Trojan horse
A program that acts in a clandestine or malicious manner rather than simply performing its stated function
trap door
A back-door daemon left behind after a
successful attack to allow continued access by the
attacker.
logic bomb
A remote-access tool designed to
operate only when a specific set of logical conditions is met
stack/buffer overflow
Adding a long too many items to a stack or a buffer to overwrite or get access to other parts of memory
virus
A fragment of code embedded in a legitimate program that, when executed, can replicate
itself; may modify or destroy fi les and cause system crashes and program malfunctions.
attack surface
The amount of the program that is vulnerable to attacks
worm
A program that spreads malware between
computers without intervention from humans
port scanning
A program that spreads malware between
computers without intervention from humans
zombie system
Compromised systems that
are being used by attackers without the owners’
knowledge.
distributed denial-of-service attack
a malicious attempt to disrupt the normal traffic of a targeted server, service or network by overwhelming the target or its surrounding infrastructure with a flood of Internet traffic.
encryption
Turning plaintext into something that
looks like random garbage (ciphertext ), using a
key