General Concepts Flashcards
IP Address
A numerical label assigned to each device connected to a computer network that uses the Internet Protocol for communication.
Port
A communication endpoint on a computer or network device, used to identify a specific process or service.
Packet Sniffing
A method of monitoring and analyzing network traffic to detect and extract sensitive information.
Phishing
A type of social engineering attack in which an attacker attempts to trick a victim into providing sensitive information, such as login credentials or financial information.
SQL Injection
A type of cyber attack in which an attacker injects malicious code into a website’s SQL database, allowing them to gain unauthorized access to sensitive information.
Man-in-the-middle (MitM)
A type of cyber attack in which an attacker intercepts and alters communication between two parties.
DDoS
A type of cyber attack in which an attacker uses a network of infected computers to flood a website or online service with traffic, causing it to become unavailable to legitimate users.
Malware
Software specifically designed to harm or exploit a computer system, such as viruses, trojans, and ransomware.
Rootkit
A type of malware that is designed to conceal its presence on a system and provide an attacker with unauthorized access.
Public Key Cryptography
A method of encrypting and decrypting data using a pair of mathematically-related keys, one of which is public and the other is private.
SSH
A secure network protocol used to remotely access and manage network devices.
Vulnerability Scanning
The process of identifying potential vulnerabilities in a computer system or network.
Social Engineering
A type of cyber attack in which an attacker uses psychological manipulation to trick a victim into providing sensitive information or performing a certain action.
Botnet
A network of infected computers controlled by an attacker, used to launch DDoS attacks or other malicious activity.
Keylogger
A type of malware that records every keystroke made on a computer, allowing an attacker to steal login credentials and other sensitive information.
Encryption
The process of converting plaintext into ciphertext, making it unreadable to anyone without the decryption key.