Lesson 3 Flashcards

1
Q

this is related to scientific methods of identifying the authors of a crime by examining objects or substances involved in the crime

A

forensic analysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

refers to the explanation of a cybercrime, based on the analysis of information or traces led by the attacker in the computing systems attacked

A

forensic analysis in the context of cybersecurity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

this aims to explain the state of a computing system by extracting information and using it to reconstruct the series of actions undertaken by the attacker

A

forensic analysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

explain forensic analysis in your own words

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

practices where governments or governmental organizations perform surveillance and data collection at a national state

A

mass dataveillance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

performs surveillance and data collection on an individual of interest

A

personal dataveillance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

attacks against information systems through malware; the attacks can target the hardware, the network, the system, the applications, or the user themselves (social engineering, phishing); attacker can be an insider or outsider

A

intrusion attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

observation attacks, perturbation attacks, and hardware-targeted software attacks are classified as

A

physical attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

these are physical attacks based on the observation of the circuit behavior during a computation

A

side-channel analysis (sca) or observation attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

attacks where a device undergoes modification of physical parameters in order to obtain an incorrect behavior

A

fault attacks (i.e. power glitches, clock glitches, laser pulses, and electromagnetic pulses)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

an example of this is the rowhammer attack, flipping memory bits while reading and writing another cell; effective on SSD disks

A

hardware-targeted software attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

this refers to finding a path for each packet sent on the internet, no matter its source and its destination; this can isolate a whole country or redirect all traffic through a surveillance point

A

routing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

a hierarchical decentralized naming system for the internet, with scalability and flexibility as key design goals; used for address resolution

A

Domain name system (DNS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

the server cannot handle the load and thus does not respond to legitimate queries

A

Denial of Service (DOS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

IP datagram are also known as

A

packets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

what are the two types of routing protocols

A
  1. autonomous systems for single organization and interconnection level (internet backbone level)
  2. border gateway protocol (bgp)
17
Q

this is the protocol currently in use on the internet for the exchange of routing and reachability information among autonomous systems

A

Border Gateway Protocol

18
Q

Peeking is irresistible. If there is information visible in the packet, there is no way to keep an intermediate node from looking at it. So the ultimate defense of the end to end mode is

A

end-to-end encryption

19
Q

advanced and leveraging higher social intelligence to make people confident in the legitimacy of the request they received

A

spear fishing

20
Q

who are the weakest link in the security chain

A

users who are unaware of security issues and therefore easily deceived by simple attacks

21
Q

this aims at convincing the user to perform an action/provide sensitive information by gaining their trust

A

social engineering

22
Q

emotions, memory, or beliefs are referred to as

A

cognitive biases

23
Q

why is the education and awareness of good practice and cyber hygiene strategy of every computer user crucial

A

possible answers:
- avoid fake news
- mitigating cyber threats

24
Q

this is a complex assembly of an extremely large number of
devices, from user machines or devices to routers, linked by a huge array of
wireless and wired networking technologies.

A

internet