Unit 3 Key Words Flashcards

1
Q

Digital System

A

Based on discontinuous data/events

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Confidentiality

A

Restricting access to authed ppl only

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Integrity

A

Assuring accuracy and trustworthiness of data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Availability

A

Assuring data is available when required

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Cyber Security

A

Technologies, processes and practices used to protect networks, programs and computers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Escalation of privileges

A

Obtaining rights users don’t normally have

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Vertical escalation

A

Finding flaws in security system or OS to increase level of access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Horizontal escalation

A

Stealing password or gaining access due to program fault

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Information disclosure

A

Info passed on without permission

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Account lockout

A

Login blocked due to failed attempts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Denial of Service

A

Attack that shuts down a comp/network by flooding it with traffic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

System attack examples

A

DoS, botnet, social engineering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Physical attack examples

A

Theft

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Environmental examples

A

Floods, fire, earthquakes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Cyber-enabled Crime

A

Fraud, theft and bullying using IT

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Cyber-dependent Crime

A

Can only be carried out using a computer, i.e DoS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

State-sponsored

A

Countries spying on each other

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Hacktivist

A

Politically and socially motivated disruptive hackers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Cyber Criminal

A

Using computers to perform malicious activities, for financial gain generally

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Insider

A

Hacker from within the target organisation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Script Kiddie

A

Hacker that has no programming knowledge and uses existing scripts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Vulnerability Broker

A

Finds bugs in systems and sells them

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Scammers

A

Deceives people with false offers and information

24
Q

Phishers

A

Hackers that obtain want sensitive info such as passwords

25
Q

Cyber Terrorists

A

Hackers that want to cause fear or intimidation in society

26
Q

Mitigate Risks

A

Testing systems for vulnerabilities

27
Q

Monitor and controls systems

A

Monitoring assets

28
Q

Penetration Testing

A

Simulating attacks to find flaws

29
Q

Fuzzing

A

Inputting huge amounts of random data to find program faults

30
Q

Security Functionality

A

Identifying flaws in security mechanisms

31
Q

Sandboxing

A

Isolating untested code

32
Q

IDS

A

Monitor systems for malicious net activity

33
Q

NIDS

A

Monitor inbound and outbound net activity for suspicious patterns

34
Q

HIDS

A

Installed on every net computer, has two-way access to external environment, monitors i/o

35
Q

DIDS

A

Multiple IDS over a large net, communicating with each other via a central server

36
Q

Anomaly Based

A

Monitors network activity and classifies whether the activity is expected or not.

37
Q

Signature Based

A

Monitor net traffic for specific known patterns used by malware

38
Q

Honeypot

A

Decoy computer/net to detect and deflect attacks

39
Q

IPS

A

Proactive detection against intruders

40
Q

Physical Security

A

Limits access to buildings

41
Q

Biometrics

A

Uses persons physical characteristics to identify them

42
Q

Swipe Cards

A

Magnetic/RFID cards that can be swiped to authorise people

43
Q

Alarms

A

Deter people

44
Q

hardware Security

A

Prevents physical removal of items

45
Q

Safe

A

Securely store items

46
Q

Cable Locks

A

Secure items to an immovable object

47
Q

Engraving

A

Engrave identification on the hardware

48
Q

SmartWater

A

Liquid that leaves a long-lasting identifier, presence is invisible

49
Q

Firewall

A

Monitors incoming and outgoing traffic, decides whether to allow or block

50
Q

Anti-malware

A

Protects a system from malware infiltration

51
Q

Operating system Updates

A

Remove or corrects vulnerabilities

52
Q

Patch Management

A

Updating patches for software to fix any vulnerabilities

53
Q

Encryption

A

Protects the confidential of digital data, scrambling it with a code

54
Q

Asymmetric Encryption

A

Uses a public key to encrypt and a private key to decrypt

55
Q

Symmetric Encryption

A

One key shared among recipients for encryption and decryption

56
Q

Cryptography

A

Protects information on open and closed networks