Final Exam (Not Including Midterm Material) Flashcards

1
Q

Security

A

Focused on external threats, unlike protection, which is focuses on internal concerns

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Breach of Confidentiality

A

Information is no longer secret

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Breach of integrity

A

Information may have been changed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Breach of availability

A

System/information may not be available

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

theft of service

A

Using a service that the user should not be allowed to

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

denial of service

A

An attack that makes it so that the system cannot complete services

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

masquerading

A

An unauthorized user claiming to be a user that is authorized

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

authentication

A

an attempt to verify that a user or
message is what it claims to be

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

replay attack

A

Retransmitting the previously transmitted password to try to get authenticated

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

message modification

A

When an attacker changes the contents of a message from an authenticated user

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

man-in-the-middle attack

A

Attacker intercepts messages from both parties and pretends to be the person they want to communicate with

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

session hijacking

A

After a user is authenticated, another user cuts them off and communicates in their name

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

privilege escalation

A

The enabling of more privileges than an entity (process, system, person) should have

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Trojan horse

A

A program that acts in a clandestine or malicious manner rather than simply performing its stated function

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

trap door

A

A back-door daemon left behind after a
successful attack to allow continued access by the
attacker.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

logic bomb

A

A remote-access tool designed to
operate only when a specific set of logical conditions is met

17
Q

stack/buffer overflow

A

Adding a long too many items to a stack or a buffer to overwrite or get access to other parts of memory

18
Q

virus

A

A fragment of code embedded in a legitimate program that, when executed, can replicate
itself; may modify or destroy fi les and cause system crashes and program malfunctions.

19
Q

attack surface

A

The amount of the program that is vulnerable to attacks

20
Q

worm

A

A program that spreads malware between
computers without intervention from humans

21
Q

port scanning

A

A program that spreads malware between
computers without intervention from humans

22
Q

zombie system

A

Compromised systems that
are being used by attackers without the owners’
knowledge.

23
Q

distributed denial-of-service attack

A

a malicious attempt to disrupt the normal traffic of a targeted server, service or network by overwhelming the target or its surrounding infrastructure with a flood of Internet traffic.

24
Q

encryption

A

Turning plaintext into something that
looks like random garbage (ciphertext ), using a
key

25
Q

key

A

A sequence of symbols used to convert plaintext into cyphertext and back again

26
Q

symmetric encryption

A

The same key is used to encrypt and decrypt a message

27
Q

block cipher

A

Cyphers are encrypted in blocks. Can be unsafe because the same message will be encrypted the same way

28
Q

cipher-block chaining

A

Like a block cypher, but combines the block with the previous block to avoid the same message being encrypted the same way

29
Q

stream cipher

A

Encrypts bytes as they are sent, instead of in blocks

30
Q

asymmetric encryption

A

Uses a key pair. Encryption key is different than decryption key.

31
Q

private key

A
32
Q

public key

A

A key that is kept secret

33
Q

(secure) hash function

A

Turning a large message into a smaller hashed function

34
Q

message digest

A

a fixed size numeric representation of the contents of a message, computed by a hash function

35
Q

digital signature

A

An encrypted signature proving the authenticity of a document

36
Q

password

A

A secret message used to get access to a system

37
Q

one-time password

A

A password that can only be used once