Security Flashcards

1
Q

What must be addressed when sending or receiving information over a computer network?

A

1) Confidentiality: info cant be read by others
2) Authentication: verify party is who they say they are
3) Integrity: message we sent has not been tampered with
4) Non-repudiation: proof someone sent a message

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Cryptography

A

the science of encrypting and decrypting messages

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Encryption

A

method for taking plaintext into ciphertext

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Problems with Cesar Cipher

A

key size too small, suceptible to brute force attack and cryptanalysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Symmetric Encryption

A

both encryptor and decryptor use the same key, impractical for user and website to find ways to safely share key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Asymmetric/Public Key Encryption

A

person encrypting message and person decrypting message use different keys

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Signs URL is fake

A

IP address or @ sign

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Zombie Computer

A

remotely controlled access not using it to spy on you but using it as a bot to send spam etc.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Steps to reduce chances of hacker breaking into computer

A

1) Strong passwords with uppercase, lowercase, numbers, and letters
2) Keeping software updated
3) Anti-Virus software or use Internet Firewall
4) Multi-factor Authentication
5) JavaScript Blocker

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Spyware

A

program installed on computer that can spy on user activities and take over computer remotely (ex: Dalai Llama)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Adware

A

program installed that present ads on computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Ransomware

A

Encrypts your SSD: asks payment to decrypt

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Types of Attacks

A

1) Worms (propagate copies of itself on a network
through network, example ILUVU)
2) Virus, (attaches itself to other programs, adds code to other programs on computer)
3) Trojan horse (things that claim they are one thing but are another also ILUVU)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Social Engineering

A

hacker does not attack technical vulnerabilities but rather attack people in the system (ex: phishing)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Spearfishing

A

hacker studies and targets specific individual, usually carefully crafted email

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Firewalls

A

monitors network traffic between a computer or set of computers,

17
Q

Proxy server

A

computer that acts as intermediary between two different computers; used for access to location based resources like Medline while student is off campus

18
Q

Virtual Private Networks

A

encryption of network traffic, hides internet activities from internet service provider

19
Q

Objectives of Secure Email

A

Confidentiality
Authentication
Anonymity/privacy
No IP record

20
Q

HTTP vs HTTPS

A

HTTPS secure version of HTTP,
- HTTP not encrypted and does not verify party
- HTTPS requires website have valid certificate

21
Q

Why is privacy an issue now?

A

1) CCTV more available, people can gather information with AI techniques,
2) Cellphones are with us everywhere and can be tracked
3) Consumption increasingly online which can be tracked

22
Q

Product vs. Customer

A

when using commercial service, you are either customer or product; subscription, ads, selling of ur data

23
Q

What can 3rd party cookies do?

A

website can allow a third party like an ad network to track users actions across multiple networks