Miscellaneous Terms Flashcards

1
Q

CIA Triad

A

One of the most commonly used security models in the cybersecurity industry. CIA stands for Confidentiality, Integrity, and Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Confidentiality

A

To protect data from unauthorized access.
- Only the people who should see the data should have permission to view it.
- Use secure methods, such as encryption, when storing the data and sharing data across a network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Integrity

A

To ensure that data is never tampered with
- Give permission to update the data only to the users who are authorized users at all times

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Availability

A

To ensure that data is readily accessible to the authorized users at all times.
- Minimum downtime
- UPS (Uninterrupted Power Supply) for network systems
- Rapid system recovery in case of a disaster

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

IoT (Internet of Things)

A

The network of devices (including computers, mobile devices, home appliances, vehicles, and other electronic devices) that are connected to the internet, enabling the sending and receiving of data among them.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Unauthorized Hacker

A

The unethical criminal hacker who breaks laws, steals data, holds information for ransom, and commits other criminal acts. Their behavior is meant to cause harm, to draw attention to something, or to achieve personal gain.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Authorized Hacker

A

The ethical cybersecurity expert who has permission to perform security tests and who fully discloses their activities. They report vulnerabilities and improve the security of a system. Their behavior is noble and their actions align with society’s greater good.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

In-Between Hacker

A

Uses illegal and/or unethical means to discover a system’s security vulnerabilities. Typically, gray-hat hackers access systems illegally - without permission - but then share their findings and report problems they find.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Packet

A

Small units of data, transmitted on a network. Collected together, they compose some larger data, such as a document, a website, a movie, etc.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Pen (Penetration) test

A

Performing a computer attack to evaluate the security of a system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

IIS (Internet Information Services) Manager

A

A convenient administration tool for the Microsoft IIS web server. It allows administrators to define the behavior and structure of websites run by IIS and supports secure site configurations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Hardening

A

In terms of computer science, hardening a system means to increase its security and reduce its vulnerabilities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Abstraction

A

A very common concept in computer science and information technology; it means that a lot of the details of a system or a process are hidden, allowing the user to focus on the details that are important for the task at hand.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

HTML tag

A

A code that defines every structure on a HTML page, such as text, images, and links. HTML tags begin with a less than (<) character and end with a greater than (>).
Examples: < p >, < script >, < i > (Remove Spaces)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Linux

A

An operating system similar in concept to the Windows OS but used more often to host routers and web servers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

SQL (Structured Query Language)

A

A language used to manage digital data stored in a relational database (tables that connect to other tables). Data is managed using CRUD: Create (INSERT), Read (SELECT), UPDATE, and DELETE.

16
Q

Data Cleansing

A

The process of protecting against XSS and SQL exploits by adding security measures that recognize any scripting tags entered by a user. The web server treats them as plain text or deletes them completely from the user input, removing any of their functionality.

17
Q

Packet Sniffing

A

Watching and analyzing network traffic at the packet level. (ex: Wireshark)

18
Q

ping

A

A network tool that’s used to check the status of a host.

19
Q

Packet Filtering

A

In network security, it allows or denies packets based on source and destination addresses, ports, or protocols.

20
Q

Timestamp

A

In Wireshark, the time the packet arrived. Timestamp is the current system time of the host on which Wireshark is running.

21
Q

pcap file

A

A Wireshark data capture file that contains packet information of network traffic

22
Q

HTTP (Hyper Text Transfer Protocol)

A

The underlying protocol used by the World Wide Web. It defines how messages are formatted and transmitted and what actions Web servers and browsers should take in response to various commands.