security Flashcards

security

1
Q

access levels / level of access

A

Settings that determine who can access an item and what they can do with it (read, write, delete). Applies to files, folders and databases among other things.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

anti-virus

A

Software to detect and remove viruses and other malware.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

asymmetric key encryption

A

Encryption system in which two keys are used: a public key used only to encrypt data, and a private key used only to decrypt it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

authentication

A

Establishing a user’s identity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

backdoor

A

Method of bypassing security in a system, built in by the system designers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

biometric enrolment

A

Process of registering a user for a biometric system by taking an initial sample.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

biometric template

A

Measurements taken from a biometric sample.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

biometrics

A

Use of fingerprints, retina scans, or other body features as an authentication mechanism.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

botnet

A

Group of zombie computers under the control of a criminal.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

brute force attack

A

Attempt to break a password by trying all possible combinations of letters, numbers, and symbols.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

CAPTCHA

A

Scribble text displayed as an image, which the user must type in to verify that they are a person.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Certificate Authority

A

Organisation that issues digital certificates to individuals and companies.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

ciphertext

A

Result of encrypting plaintext.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Computer Misuse Act

A

UK law governing criminal offences committed using a computer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

cracking

A

Gaining illegal access to a computer system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

DDoS

A

Denial of service attack committed using dozens of computers, usually zombies on a botnet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

denial of service attack

A

Flooding a computer system with data so that it cannot respond to genuine users.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

dictionary attack

A

Attempt to break a password by trying all possible words.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

digital signatures

A

Technique used to authenticate remote users, such as online shopping businesses.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Distributed Denial of Service attack

A

Denial of service attack committed using dozens of computers, usually zombies on a botnet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

DNS poisoning

A

Technique used by criminals to alter DNS records and drive users to fake sites, to committing phishing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

DoS

A

Flooding a computer system with data so that it cannot respond to genuine users.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Drive-by download

A

Program which automatically downloads when a user visits a web page, usually without their knowledge or consent.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

encryption

A

System of encoding plaintext so that it cannot be understood with access to an encryption key.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
encryption key
Used to encrypt and decrypt data.
26
EV SSL
Extended Validation SSL. Digital certificate validation technique used on the world wide web.
27
false negative
When a system incorrectly rejects an action instead of accepting it.
28
false positive
When a system incorrectly accepts an action instead of rejecting it.
29
full disk encryption
System that encrypts all data saved to a hard disk automatically and transparently.
30
hacking
Gaining illegal access to a computer system
31
home directory
Directory that contains a users personal files.
32
https
Protocol used to send web pages securely over the Internet.
33
identity theft
Stealing personal data in order to impersonate a person.
34
key escrow
Idea of having encryption keys stored by a third party company so the government can access them if needed.
35
key logger
Software or hardware which records all key strokes on a computer system.
36
key pair
A public key and private key that work together in a public encryption system.
37
macro virus
Virus that takes advantage of the macro programming languages built into some software.
38
malware
Generic name for malicious software
39
Multi-factor authentication
Use of several authentication techniques together, such as passwords and security tokens.
40
one time password
Password generated by a security token, which expires as soon as it is used.
41
packet sniffer
Software or hardware used to collect data travelling over a network.
42
passphrase
Word or phrase used to authenticate a user.
43
password
Word or phrase used to authenticate a user.
44
pharming
Technique used by criminals to alter DNS records and drive users to fake sites, to committing phishing.
45
phishing
Use of fake emails and web sites to trick users into revealing sensitive data.
46
physical security
Locks, alarms, and other techniques used to securely a building or computer room.
47
plaintext
Message before it is encrypted, or after it has been decrypted.
48
private key
Key used for decryption in a public key encryption system.
49
public key
Key used for encryption in a public key encryption system.
50
public key encryption
Encryption system in which two keys are used: a public key used only to encrypt data, and a private key used only to decrypt it.
51
root user
User with full control over a computer system.
52
rootkit
Type of malware which infiltrates the operating system and attempts to hide itself from view.
53
secret key encryption
Encryption system in which a single key is used for both encryption and decryption.
54
Secure Socket Layer
System used to encrypt https web traffic.
55
security token
Hardware device that must be present during login to authenticate a user.
56
security update
Software update to fix a security problem discovered in software.
57
smishing
Phishing attacks committed using text messages (SMS).
58
social engineering
Tricking a user into revealing their password or other sensitive data.
59
spam
Unwanted, bulk email.
60
spam bot
Program that scans web pages for email address, in order to send spam.
61
spam filters
Program designed to identify and block spam messages while letting genuine messages through.
62
spyware
Malware which covertly records a user's actions, such as their key presses.
63
SSL
System used to encrypt https web traffic.
64
symmetric key encryption
Encryption system in which a single key is used for both encryption and decryption.
65
system administrator
Personal in overall charge of a computer system in an organisation.
66
TLS
System used to encrypt https web traffic.
67
Transport Layer Security
System used to encrypt https web traffic.
68
trojan horse
Malware which pretends to be a genuinely useful program to trick the user into using it.
69
unauthorised access
Gaining illegal access to a computer system
70
Virus
Computer program which damages files and data spreads when infected programs are copied.
71
virus definition file
Used by anti-virus programs to recognise known viruses.
72
vishing
Phishing attacks committed using telephone calls or VoIP systems.
73
vulnerability scanner
Software to scan a system for potential security problems.
74
web bug
Technique used by spammers to detect if an email address is valid or not.
75
WEP
Wired Equivalence Protocol. Wireless network encryption system.
76
worm
Malicious software which replicates itself and spreads between computer systems and over networks.
77
WPA
Wireless Protected Access. Wireless network encryption system.
78
WPA2
Wireless Protected Access 2. Wireless network encryption system.
79
zombie
Computer which has been compromised by malware and is part of a botnet.