Student Text Flashcards
What are the standard computer capabilities and characteristics?
- Speed
- Accuracy
- Diligence
- Versatility
What is the fastest possible speed for information transmission?
Speed of light
What is limited by the efficiency of the programmed algorithms being computer and system components?
Computer speed
What is a personal computer that may of may not be connected to a network?
Workstation
What are the different types of client workstations?
- Thin client
- Thick client
What is a software program or actual computer relying heavily on another computer to do most of its work?
Thin client
What operates on a network with client software or computer acting as an interface & the network doing all the processing work?
Thin client
What is a workstation computer in a client server configuration functioning independent of the server?
Thick client
What pulls some data from a central server and may run on its own without being connected to the server?
Thick client
What is a computer on a network managing shared resources for other systems on the network?
A server
What are some common types of servers?
- Application
- Catalog
- Database
- DHCP
- File
- Proxy
- Web
What is a computer system weakness that is open to exploitation?
Vulnerability
What is a possible danger that may take advantage of a vulnerability?
Threat
What is the likelihood that a threat will take advantage of a vulnerability?
Risk
What are some types of malicious code?
- Viruses
- Worms
- Logic bombs
- Spyware
- Adware
- Rootkits
- Botnets
What is code that spreads from one computer to another by attaching itself to other files?
A virus
What is code that spreads from one computer to another on its own but not by attaching itself to another file?
A worm
What is code that sits dormant on a target computer until it’s triggered by a specific event?
A logic bomb
What stealthily installs malicious software intended to track and report data from a target system?
Spyware
What is software that automatically displays or downloads advertisements?
Adware
What is code intended to take full of partial control of a system at low levels?
A rootkit
What is a collection of software robots run by a command & control (C2) program which in turn is controlled by a person?
A botnet
What are some common causes of vulnerabilities?
- Configuration/familiarity
- Implementation
- Design
What can a system or application misconfiguration cause?
A vulnerability
What can using well known software increase?
The probability of an attacker finding a vulnerability to exploit
What can lack of input validation cause?
A vulnerability
Is there a possibility that there are vulnerabilities that are inherent in protocols, applications, or architecture used in the design?
Yes
What are the primary threat categories?
- Unstructured threats
- Structured threats
- Internal threats
- External threats
What are unfocused attacks on one or more network systems often by individuals with limited skill?
An unstructured threat
What types of threats are focused by one or more individuals with high skills actively working to compromise a specific system?
A structured threat
What threats originate from individuals who have (or had) authorized access to the network?
Internal threats
What threats originate from individuals outside the organization?
External threats
What are common vulnerability sources?
- Common Vulnerability and Exposure (CVE)
- US National Vulnerability Database (NVD)
- Exploit Database (DB)
What was developed by MITRE in 1999 and has a list of vulnerability entries?
Common Vulnerability Sources (CVE)
What contains an ID number, description, and at least one public reference?
A Common Vulnerability Source (CVE) entry
What was launched by the US National Vulnerability Database (NVD) in 2005?
The US National Vulnerability Database (NVD)
What is a vulnerability database built upon & fully synchronized with the CVE list?
The US National Vulnerability Database (NVD)
What provides a Common Vulnerability Scoring System (CVSS)?
The US National Vulnerability Database (NVD)
What is maintained by Offensive Security and is an archive of exploits, shell code, & security papers?
Exploit Database (DB)
What is on the motherboard and controls the number of tasks the computer may accomplish at once and how quickly it can complete those tasks?
The Central Processing Unit (CPU)
What is on the motherboard and is the circuitry responsible for managing specific hardware components?
Chipsets
What is on the motherboard and is a small chip the CPU relies on to synchronize & control timing on all computer operations?
The system clock
What is on the motherboard and is a small plastic slot used to install various devices?
Expansion slots
What is on the motherboard, translates processor requests into instructions the component can understand and executes Power-On-Self-Test (POST)?
The BIOS
What is on the motherboard, contains the computer’s inventory list & advanced setup options, and stores data read by the BIOS?
The CMOS
What are the two types of memory?
RAM (Random Access Memory) and ROM (Read Only Memory)
What is a memory chip on a computer responsible for storing temporary data and is volatile in nature?
RAM
What is a chip with read-only data that are essential instructions when the system is turned on and is non-volatile in nature?
ROM
What stores changing digital data in a relatively permanent form with the most popular being SCSI, SAS, and SATA?
Hard drives
What are the two basic distributed system architectures?
- Client-server model (centralized environment)
- Peer-to-peer model (decentralized environment)
What is an architecture where smart clients contact the server for data then format and displays it to the user?
The client-server model
What is an architecture where there are no special machines that provide a server or manage the network resources and every node can serve as both client and server?
The peer-to-peer model
What are the security basics?
- The CIA triad
- Enforce system policies & procedures
- The four A’s
- System hardening
- Vulnerability management
- Due care, due diligence, & due process
- Operations continuity & disaster recovery plans
What is the CIA Triad?
Confidentiality, Integrity, and Availability
What does a policy statement do?
Outlines a plan for the user security component
What measures the level of adherence to the security policy?
Standards
What are recommendations or best practices for how to meet the policy standard?
Guidelines
What are step-by-step instructions that detail how to implement components of the policy?
Procedures
What are the four A’s?
Authentication, authorization, access control, auditing/accounting
What is the process of uniquely ID’ing a particular individual or entity?
Authentication
What is the process of determining what rights & privileges a particular entity has?
Authorization
What is the process of determining & assigning privileges to resources, objects, or data?
Access Control
What is the process of tracking & recording system activities & resource access?
Auditing/accounting
What is system hardening?
Eliminate as many security risks as possible
What are some examples of system hardening?
- Disabling unnecessary services
- Protecting management interfaces & applications
- Disabling unnecessary accounts
- Password protection
What is an ongoing comprehensive process or program that aims at managing an organization’s vulnerabilities in a holistic & continuous manner?
Vulnerability management
What are some types of vulnerability management?
- Asset management
- Software management
- Vulnerability assessment
- Patch management
- Change management
What is a policy describing how individuals should use & maintain organization issued hardware & software and includes both using the equipment safely & using it in an approved manner?
Due Care
What is investing & researching all issues & options relating to a particular subject, ensuring security policies & practices are effective, and ensuring no violations in laws, statutes, or individual human rights?
Due diligence
The organization does not assume an individual is guilty?
Due process
What defines how an organization will maintain normal day-to-day Ops during a disruption or crisis?
Operations continuity plan
What defines how people & resources will be protected in case of a natural or man-made disaster?
Disaster recovery plan
What are the capabilities & benefits of websites?
- Reduces communication costs
- Enhances communication & coordination
- Accelerates the distribution of knowledge
- Improves the customer service & customer satisfaction
What are some capabilities & benefits of databases?
- Data sharing is improved in the organization
- Improvement in data security
- Effective data integration
- DBMS minimizes data inconsistency
- Better access to data
- Increase in productivity of the end user
- Quick decision making
What are the 10 most critical security risks?
- Injection
- Broken authentication
- Sensitive data exposure
- XML External Entities (XXE)
- Broken access control
- Security misconfiguration
- Cross-site scripting (XSS)
- Insecure deserialization
- Using components with known vulnerabilities
- Insufficient logging & monitoring
What is it called when untrusted data is sent to an interpreter as part of a command or query and tricks it into accessing data without proper authorization?
Injection
What is it called when issues with application functions related to authentication & session management allow someone to assume another users’ identity temporarily or permanently?
Broken authentication
What is it called when lack of encryption for data at rest or in transit leads to the release of PII, healthcare, etc?
Sensitive data exposure
What is it called when someone fails to enforce authenticated user restrictions?
Broken access control
What allows someone to exploit unpatched flaws or default configurations?
Security misconfigurations
What is it called when theirs insufficient input validation and attackers are able to add malicious content to a website & content executed on other victim’s browser?
Cross-Site Scripting (XSS)
What is it called when existing data structures are used but content is changed?
Insecure deserialization
When you use preconfigured client/server-side components but you don’t understand the component patch state what are you possibly doing?
Using components with known vulnerabilities
When you are not validating logging & monitoring capabilities what are you setting yourself up for?
Insufficient logging and monitoring
What are the various website components?
- Web page
- Web content
- Websites
- Web browser
- Web applications
- Browser engine
What is a computer file that is suitable for the World Wide Web & a web browser?
Web page
What are the two types of web pages?
Static and dynamic
What is a flat/stationary web page called?
Static web pages
What web page is controlled by application server processing server-side scripts and client web browser processing client-side scripts?
Dynamic web pages
What is the textual, visual or aural content that is encountered as part of the user experience on a website?
Web content
What is a collection of related web pages ID’d by a common domain name, published on at least one web server and accessible by IP networks or private LAN by URL?
Websites
What is an application for accessing information on WWW by retrieving web page & content by distinct URLs onto the user’s device?
Web browser
What is a client-server program which the client runs in a web browser?
Web application
What is the core software component of every major web browser?
Browser engine
What are some common database terms?
- Data
- Database
- Database system (Schema)
- Database Management System (DBMS)
What are recorded facts & figures called?
Data
What is a collection of meaningful information organized for searching & retrieving that information?
Database
What is the logical layout for the database?
Database system (Schema)
What is a set of programs & utilities executed on a computer to create, process, & administer a database?
Database management system (DBMS)
What are the four major components?
Data, hardware, users, software
What is known facts recorded & implicit meaning?
Data
What are data characteristics?
Persistent, integrated, shared
What is computing equipment needed to use & maintain the database?
Hardware
What are individuals manipulating or maintaining aspects of the database?
Users
What are the four broad classes of users?
- End-user
- Database designers
- Database administrators (DBA)
- Applications programmers
What are the DBMS key components?
- Data dictionary
- Data security
- Performance management
- Data recovery
- Data integrity
- Data interface
What are the four web language types?
- Markup languages
- Style sheets
- Client-side scripting languages
- Server-side scripting languages
What is a modern system for annotating a document in a way syntactically distinguishable from text?
Markup languages
What are the general categories of markup languages?
- Presentational
- Procedural
- Descriptive
What are the most common markup languages?
- HyperText Markup Language (HTML)
- Extensible HyperText Markup Language (XHTML)
- Extensible Markup Language (XML)
What is a form of separation of presentation & content for web design?
Style sheets
What are some examples of style sheets?
- Cascading Style Sheets (CSS)
- Extensible Stylesheet Language (XSLT)
What is a class of computer programs on the web executed client-side instead of server-side (on the Web Server)?
Client-side scripting languages
What is executed by the web server when the user requests a document?
Server-side scripting languages