Security Basics Flashcards

You may prefer our related Brainscape-certified flashcards:
1
Q

Define Authorized Users.

A

People who are meant to have access to a certain system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Define Hackers.

A

People who attempt to gain access to a computer system in a way not intended by the system’s owner.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Define Malware.

A

Malicious software created or used by hackers that does something the owner of the system does not want.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Define Severtiy.

A

The seriousness of a crime from the perspective of the victim and from the perspective of the law.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Define Secure Systems.

A

Systems that are secure against known threats and potential ones (to an extent).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are White Hat Hackers?

A

Security professionals brought in and paid specifically to test the security of a system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are Black Hat Hackers?

A

People who gain access to a system without permission and steal/alter data. Not always for personal profit, sometimes it is an act of civil disobedience.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are grey hat hackers?

A

People who gain access to a system without permission but with no malicious intent. Often used to inform a company about vulnerabilities of their system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

How is severity judged?

A

It is judged by the stemming from the connection to further crimes. The act itself is not the only thing looked at, it is the intentions of the hacker, and how accessing a system could cause further crimes in the future.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Define Computer Viruses.

A

Unwanted, self-replication embedded code with a debilitation effect on a computer system. Different to ‘bugs’ which are unintended errors. Come in a variety of different flavours. Virus detection relies on recognizing the code in viruses.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Define Trojan horse.

A

Software that masquerades as something else that does something malicious when executed. Typically delivered in downloadable files from websites or emails.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Define worms.

A

A network propagated virus, meaning it spreads system, to system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Define Zombies.

A

A software program that is used to control your computer remotely without your knowledge.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Define key loggers.

A

Software that sits on the computer and logs the keys you press. It can also come in the form of hardware, for example inserting a USB into the back of a computer and then using the USB to see the stream f inputs a user has entered.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Define rootkits.

A

Hides software’s presence from a user by gaining root access toa system. When a computing system (OS) software is running, rootkit lies and hides the software. Can only be removed by re-installing the OS unless you know where the root kit is, or the type involved.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Define BIOS rootkits.

A

The evolution of rootkits. Can only be removed by reformatting the BIOS.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What are passwords?

A

Passwords authenticate you as an authorized user based on a shared secret between you and the system. We know it is each other as we know the shared secret

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

How are passwords stored?

A

Passwords are stored in a single, hashed, and slated file typically called a password file. Every website has a file like this as does your computer. Access to this file should be strictly controlled and not even the company should be able to see it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Define Hashing.

A

A mathematical process that takes data of an arbitrary size and maps it to a fixed size hash value. In password storage the hash function is hard to reverse so you cannot guess the password from the hash.

20
Q

Define Salting.

A

Another method of increasing the security for storing passwords. A salt is a string of characters added to a password, and then it is hashed.

21
Q

What is a Brute Force Attack?

A

A program that submits many passwords/passphrases with the hope it is eventually guess correct (A systematic process).

22
Q

What is a dictionary attack?

A

Similar to a brute force attack but uses words from the dictionary or uses the list of common broken passwords in attempt to guess a password.

23
Q

What is a Rainbow Table Attack?

A

Using pre-computer encrypted passwords and using the high processing power of a high-end computer and waiting for a data leak to find which passwords/account they can get into.

24
Q

What are biometrics?

A

Unique measures of yourself.

25
Q

What is zero day?

A

Unknown exploits not yet disclosed. Makes it difficult to know if a computer system is ever secure.

26
Q

What are Bug Bounties?

A

Companies offering payments for finding bugs. Prevents/discourages people selling exploits.

26
Q

What are Bug Bounties?

A

Companies offering payments for finding bugs. Prevents/discourages people selling exploits.

27
Q

What is a DDOS Attack?

A

Distributed Denial of service attacks destroy utility of a network or resource, usually by means of a flood attack. Submitting more requests than a web page server can handle causing it inaccessible to other users trying to access the same website as the server would be slow or crash.

28
Q

What is Phishing?

A

Phishing originally was an email pointing AOL (American web portal) users to a fake AOL login screen to capture login details. It has then moved to other online services, especially online banking.

29
Q

What is Pharming?

A

Pharming uses cracked DNS servers. A cracked DNS is where a URL’s matching IP has been changed unintentionally by a hacker and therefore the URL redirects to the wrong IP.

30
Q

What is Ransomware?

A

It’s a malicious application of encryption technology. Once installed on a targets computer it will encrypt the users hard drive locking all the information stored. The only way to get it hack is via the decryption key. The data is in effect destroyed as it becomes completely inaccessible.

30
Q

What is the most powerful technique available to hackers?

A

Humans. Social engineering and the idea that people want to help people, we are our own weakness.

31
Q

What is Spear Phishing?

A

Sending customized emails to a single person so they will be more likely to open it, sometimes contains customized Trojans. It can exploit the fact that spam filters and anti-virus needs to know about an email/trojan.

32
Q

What is baiting?

A

Getting malicious software onto a users’ machine physically by leaving a USB lying around.

33
Q

What is the man in the middle?

A

When two users send private information to each other over a network there is a chance that people other than the recipient will read the data. We assume that a man in the middle attacker exists.

34
Q

What do we assume the man in the middle can do?

A

View - see communications
Intercept - stop messages from reaching the sender
Repeat - do it again to attempt access to a system

35
Q

Define Cryptography:

A

A form of secret writing, any technique to disguise the meaning of a word to those who don’t know how to interpret it.

36
Q

How do transition ciphers work?

A

Swap the ordering of letters in a fixed pattern. Hello world = eHlol owrdl

37
Q

How do substitution ciphers work?

A

Take a letter and replace it with another letter. Hello world = Ifmmp xpsmc

38
Q

What are the drawbacks of cipher approaches?

A

Once the cipher is know, messages are reversible. Ciphers can be solved via brute force attacks.

39
Q

What are frequency attacks?

A

Man in the middles views all our messages and know that letters do not get used randomly, in any long message this histogram will reveal links between code letters and message letters.

40
Q

What is Kerkhof’s principle?

A

The security of a key alone must be sufficient to guarantee the security of a message using the system.

41
Q

What is symmetric encryption?

A

A form of encryption where on (secret) is used to both encrypt and decrypt data. There are still issues of vulnerability when first sharing the key.

42
Q

What is asymmetric encryption?

A

A form of encryption where you use the recipients public key to encrypt the data and have it so that only recipients private key can decrypt the data.

43
Q

What is Diffie-Hellman?

A

Establishing a shared secret between two parties where communication can’t be seen by an eavesdropper.