midterm terms Flashcards

1
Q

phishing

A

tricking people to give away personal information (usually by email)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

advanced encryption standards

A

encryption standards established in 2001 and supports 128, 192, 256 bits

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

hash

A

using an algorithm, sorts data with a label so by the end of transit, it’ll be known if the data was tampered with

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

what is a virus

A

a malicious software that attaches itself to a host

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

ransomware

A

a type of virus that disables the system for ransom

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

worm

A

a complete program that copies itself from one computer to another

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

stream cypher

A

encode and decode the message one character (byte) at a time

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

block cypher

A

encode and decode the message many characters (bytes) at a time, usually 16 bytes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

signatures

A

authentication of who sent the message

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

access control matrix

A

a detailed tables of subject to objects where the cells are the rights of the related subjects and objects by row and column

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

autorun virus

A

a virus that resides as an autorun program in a dick (ex: usb)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

mandatory access control

A

the system sets the rights

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

logic bomb

A

violates the site security policy when some external event occurs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

stealth virus

A

conceals infection of files undetected

changes data within the intercepted calls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

access control

A

the rules of what someone has access to

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

steganography

A

an attack that hides data in other data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

integrity

A

data is trustworthy and free from tampering (no change)

18
Q

public/private keys

A

used for encryption and decryption

19
Q

public key

A

encryption, available to anyone

20
Q

private key

A

decryption, known only to individual

21
Q

trojan horse

A

malware that tricks users of its true intent by disguising itself as a normal program

22
Q

RSA

A

uses math and large prime integers to drive the key, and uses exponential and modulus functions with the keys encode and decode the message

23
Q

distributional denial of service (DDoS)

A

the attacker floods a server with internet traffic to prevent users from accessing online services (affects availability)

24
Q

availability

A

viewable/access by people

25
Q

clark wilson model

A

protects the integrity of commercial information by allowing only certified actions by explicitly authorized users on resources (contraints)

26
Q

symmetric key

A

the encryption key and decryption key is the same

27
Q

digital encryption system (DES)

A

block cypher, encryption, 56-bit key length, uses algorithms to scramble data into an unreadable format

28
Q

polymorphic

A

encryption of data in multiple forms that are protected by multiple keys

29
Q

transposition

A

reorder the message by choosing every nth character. n is both encryption and decryption key

30
Q

Bell-LaPadula Model

A

used for confidentiality, read down, write down, policy method

31
Q

block modes

A

for block cyphers, key generation used during the encryption for each single block

32
Q

biba model

A

used for integrity, read up, write down, the higher the integrity level, the more trustworthy the source

33
Q

firewall

A

allowing traffic from source to destination

34
Q

collision

A

when 2 inputs produce the same (hash) output

35
Q

confidentiality

A

data is kept secrete or private

36
Q

policy

A

a set of rules that define the degree of protection required

37
Q

Protocols

A

specification on implementing policy

38
Q

practice

A

actions to implement protocol, making sure protocols are being followed

39
Q

Rivest Cipher 4 (RC4)

A

stream cypher, generates a key stream of bytes (1-256) from an initial variable length key, key scheduling algorithm for each byte at a time

40
Q

access control list

A

objects perspective

41
Q

access control capability list

A

subjects perspective

42
Q

substitution

A

modify the plain text by swapping each character with another character on the list