Threats and Vulnerabilities Flashcards
what is information security?
protects data and information from unathorized access.
what is information system security?
protects the systems that hold and process critical data.
what is CVE?
common vulnerabilites and exposures. a list of publicly disclosed computer security weaknesses.
what is an exploit?
software code that takes advantage of a security flaw or vulnerability.
what is the CIA triad?
confidentiality, integrity and availabilty
what does confidentiality relate to?
encryption
what does integrity relate to?
hashing
what does availabilty relate to?
redundancy
what is a non compliant system?
system that is not on the baseline of what is approved by the organization
what is an unpatched system?
system without patches and updates
what is an unprotected system?
system not protected by any anti virus or firewall
what is End of Life (EOL)?
OS manufacturer stops providing security patches for any vulnerabilities.
what is a Zero Day Vulnerability?
vulnerability that is discovered or exploited before the vendor can issue a patch to fix it.
what is a Denial of Service (DoS) attack?
used to describe an attack that attempts to make a computer or servers resources unavailable.
what is a Flood Attack?
specialized type of DoS that attempts to send more packets to a server or host
what is a Ping Flood?
happens when too many pings (ICMP echo) are being sent.
what is a SYN flood?
attacker initiates multiple TCP sessions but never completes the three way handshake.
what is a permanent denial of service attack?
attack that exploits a security flaw to permanently break a networking device by reflashing its firmware
what is a Fork Bomb?
attack that creates a large number of processes to use up the available processing power of a computer.