Final Review Flashcards

1
Q

CIA

A

Confidentiality - preventing unauthorized access to sensitive information

Integritiy - assurance that data is not altered/destroyed unauthorized

Availability - continuous operation of computing systems (DOS prevention)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Exploit

A

Any attack that takes advantage of vulnerabilities in applications, networks, or hardware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

T/F New exploits tend to be variations of common past exploits

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Cracker

A

A person/entity that attempts to gain unauthorized access to a computer system, network, or data with malicious intent

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Hacker

A

White hat - ethical cybersecurity
Black hat - cybercriminals
Gray hat - between the lines

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

DLP

A

Data Loss Prevention - software designed to detect to detect data leaks or breaches

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

IDS/IPS

A

Intrusion Detection / Prevention System

Located behind the firewall on protected network.
Detect and log abnormal traffic based on programmed signatures (data pattern).
Response capability based on signature = IPS.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Web Content Filtering

A

Originally intended to stop people from getting to specific websites / limit inappropriate content getting to children, now is often used to block malware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Hacker Goals

A

Reconnaissance - scanning, fingerprinting, enumerating

Exploit - steal/use/destroy info, stop/slow access, extortion

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Hacker Motivation

A

Profit
Revenge
Challenge
Vandalism

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Causes of Threats

A

Technology weakness
Configuration weakness
Policy weakness
Human error

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

PHP

A

O - Personal Home Pages
N - Php: Hypertext Preprocessor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

PHP Key Benefits

A

Familiarity, Simplicity, Flexibility, Open Source

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

PHP Tag

A

<?php … ?>
or
<? … ?>

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

T/F You can have as many php blocks as you need spread throughout your HTML

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

phpinfo( )

A

A built-in function that outputs information about PHP’s configuration

17
Q

print vs echo

A

print can return an error code (int), echo returns void

18
Q

PHP Identifiers

A

Can begin with letter or underscore, be any length, consist of ASCII characters 127-255, case sensitive characters

19
Q

PHP Variables

A

preceeded by a $

20
Q

What is <?=$x?>

A

If short tags are enabled in php.ini, it is the short form of
<?php echo $x; ?>

21
Q

Are there problems with Short Tags?

A

Unexpected behaviors, SQL injection vulnerabilities, Loose comparisons issues

22
Q

T/F You can reassign variables dynamically?

A

True (risky)

23
Q

How to Get/Set a variable’s type?

A

.gettype( ) and .settype( )

24
Q

What are Variable Variables?

A

Allow you to use the value of one variable as the name of another. Defined by a variable name preceded by another $
eg. $varname = “student_num”;
$$varname = 121131;
// means $student_num = 121131;

25
Q

PHP String Concatenation

A

. instead of +

26
Q

Primary Functions of Cryptography

A

Confidentiality - Cannot be read by others
Authentication - Mathematically prove the source of the data
Integrity - Assurance the data has not been altered
Nonrepudiation - verify the identity of the sender

27
Q

Encryption vs Hashing

A

Encryption - two way
Hashing - one way

28
Q

Symmetric Algorithms

A

Same key, requires sender & receiver to agree on a key, AKA secret key, single-key, or one-key algorithms

29
Q

Asymmetric Encryption

A

Different keys. Encrypt with private, decrypt with public. Recommended minimum length is now 2048-bit

30
Q

Digital Signatures

A

Utilize hash functions to create and verify digital signatures. Provides non repudiation and authentication. Issue is that computation is done by the computer, not the person.

31
Q

Digital Certificates

A

Electronic document attached to a public key by a trusted third party which provides proof that the public key belongs to a legitimate owner and has not been compromised. Consist of cert. owner’s public key, unique info, and digital signatures of an endorser (trusted third party)

32
Q

Nonrepudiation

A

Practice of using a trusted, third-party entity to verify the authenticity of a party who sends a message

33
Q

TLS

A

Transport Layer Security
Uses cryptography to enable encryption of data between two parties and digital certificates to enable authentication of the parties involved in a secure transaction.

34
Q

Hashing

A

Method used to verify data integrity. Uses variable-length input that is converted to a fixed-length output string. Ex. digital signatures and secure storing of passwords

35
Q

Zero-Day Exploit

A

Technique used to attack systems that have a vulnerability that is unknown to the public, or “zero days” old

36
Q

Hardening

A

Process of modifying an OS’s default configuration to make it more secure to outside threats.
Remove unnecessary programs / services, apply patches to eliminate known vulnerabilities

37
Q

Change Management Process

A

Document existing state
Determine impact of change
Seek approval for change
Test the change
Document the changes
Review proposed changes
Schedule change and notify affected users
Deploy the change
Test and Report Success
Close the change ticket

38
Q

Obfuscation

A

The obscuring of intended meaning in communication, making the message confusing, willfully ambiguous, or harder to understand. Intentional or unintentional.