Security + Flashcards
What is the CIA triangle?
Confidentiality, Integrity, Availability. Loss of one one can lead to another.
What are causes of compromised security?
Technology weaknesses, Configuration weaknesses, Policy weaknesses, Human Error or malice
What are some of the biometric devices used?
Fingerprint scanner, hand geometry scanner, eye scanner (including retina and iris scanners), voice verification, signature verification, and DNA scan
What are some Malware varieties?
Virus, Worm, Trojan horse, Logic bomb, Rootkit, Spyware, Adware, Keylogger, Botnet, Backdoor, Drive by download, zero day exploit
What is a virus?
A computer virus is a destructive application that is loaded on your computer. A virus is a program, not data, and you can only catch a virus by running a program.
Describe the structure of a virus
Replication - viruses must propagate themselves. Payload - the malicious activity a virus performs when triggered. Payload trigger - The date or counter or circumstances present when a virus payload goes off.
What is DoS?
Denial of Service
What is DDoS?
Distributed denial of service
Name some examples of payload
Displaying messages, launching DDoS attack Erasing files randomly by type or usage, formatting hard drive, overwrite mainboard bios, sending email, expose private information
What is encryption?
Converting to unreadable format
Decryption
Converting back to readable format
Algorithm
Procedure for encrypting or decrypting
Cipher
Pair of encryption and decryption algorithms
Cryptography
Science of encryption
Phishing
the activity of defrauding an online account holder of financial information by posing as a legitimate company