Unit 3 Key Words Flashcards

1
Q

Digital System

A

Based on discontinuous data/events

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Confidentiality

A

Restricting access to authed ppl only

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Integrity

A

Assuring accuracy and trustworthiness of data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Availability

A

Assuring data is available when required

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Cyber Security

A

Technologies, processes and practices used to protect networks, programs and computers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Escalation of privileges

A

Obtaining rights users don’t normally have

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Vertical escalation

A

Finding flaws in security system or OS to increase level of access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Horizontal escalation

A

Stealing password or gaining access due to program fault

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Information disclosure

A

Info passed on without permission

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Account lockout

A

Login blocked due to failed attempts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Denial of Service

A

Attack that shuts down a comp/network by flooding it with traffic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

System attack examples

A

DoS, botnet, social engineering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Physical attack examples

A

Theft

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Environmental examples

A

Floods, fire, earthquakes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Cyber-enabled Crime

A

Fraud, theft and bullying using IT

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Cyber-dependent Crime

A

Can only be carried out using a computer, i.e DoS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

State-sponsored

A

Countries spying on each other

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Hacktivist

A

Politically and socially motivated disruptive hackers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Cyber Criminal

A

Using computers to perform malicious activities, for financial gain generally

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Insider

A

Hacker from within the target organisation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Script Kiddie

A

Hacker that has no programming knowledge and uses existing scripts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Vulnerability Broker

A

Finds bugs in systems and sells them

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Scammers

A

Deceives people with false offers and information

24
Q

Phishers

A

Hackers that obtain want sensitive info such as passwords

25
Cyber Terrorists
Hackers that want to cause fear or intimidation in society
26
Mitigate Risks
Testing systems for vulnerabilities
27
Monitor and controls systems
Monitoring assets
28
Penetration Testing
Simulating attacks to find flaws
29
Fuzzing
Inputting huge amounts of random data to find program faults
30
Security Functionality
Identifying flaws in security mechanisms
31
Sandboxing
Isolating untested code
32
IDS
Monitor systems for malicious net activity
33
NIDS
Monitor inbound and outbound net activity for suspicious patterns
34
HIDS
Installed on every net computer, has two-way access to external environment, monitors i/o
35
DIDS
Multiple IDS over a large net, communicating with each other via a central server
36
Anomaly Based
Monitors network activity and classifies whether the activity is expected or not.
37
Signature Based
Monitor net traffic for specific known patterns used by malware
38
Honeypot
Decoy computer/net to detect and deflect attacks
39
IPS
Proactive detection against intruders
40
Physical Security
Limits access to buildings
41
Biometrics
Uses persons physical characteristics to identify them
42
Swipe Cards
Magnetic/RFID cards that can be swiped to authorise people
43
Alarms
Deter people
44
hardware Security
Prevents physical removal of items
45
Safe
Securely store items
46
Cable Locks
Secure items to an immovable object
47
Engraving
Engrave identification on the hardware
48
SmartWater
Liquid that leaves a long-lasting identifier, presence is invisible
49
Firewall
Monitors incoming and outgoing traffic, decides whether to allow or block
50
Anti-malware
Protects a system from malware infiltration
51
Operating system Updates
Remove or corrects vulnerabilities
52
Patch Management
Updating patches for software to fix any vulnerabilities
53
Encryption
Protects the confidential of digital data, scrambling it with a code
54
Asymmetric Encryption
Uses a public key to encrypt and a private key to decrypt
55
Symmetric Encryption
One key shared among recipients for encryption and decryption
56
Cryptography
Protects information on open and closed networks