Vocab Flashcards

1
Q

Zero day attack

A

An attack that is executed on a vulnerability in software before the vulnerability is known to the creator of the software.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

X.509

A

A common PKI standard developed by the ITU-T that incorporates the single sign on authentication method.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Worm

A

Code that runs on a computer without the user’s knowledge; a worm self replicates, whereas a virus does not.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Wiretapping

A

Tapping into a network cable in an attempt to eavesdrop on a conversation or steal data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Wired Equivalent Privacy (WEP)

A

A deprecated wireless network security standard, less secure than WPA.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Wi-Fi Protected Setup (WPS)

A

A simplified way of connecting to wireless networks using an eight-digit code. it is now deprecated due to its insecure nature and should be disabled if currently used.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Wi-Fi Protected Access (WPA)

A

A security protocol created by the Wi-Fi alliance to secure wireless computer networks; more secure than WEP.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

White hat

A

A type of hacker that is contracted to break into a system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

White-box testing

A

A method of testing applications or systems where the tester is given access to the internal workings of the system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Whaling

A

A phishing attack that targets senior executives.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Web security gateway

A

An intermediary that can scan for viruses and filter Internet content.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Web of trust

A

A decentralized model used for sharing certificates without the need for a centralized CA.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Watering hole attack

A

An attacker profiles which websites a user accesses and later infects those sites to redirect the user to other websites.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Warm site

A

A site that has computers, phones, and servers, but they may require configuration before users can start working on them.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

War-driving

A

The act of searching for wireless networks by a person in a vehicle through the use of a device with a wireless antenna, often a particularly strong antenna.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

War-dialing

A

The act of scanning telephone numbers by dialing them one at a time and adding them to a list, in an attempt to gain access to computer networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

War-chalking

A

The act of physically drawing symbols in public places that denote open, closed, or protected wireless networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Vulnerability scanning

A

The act of scanning for weaknesses and susceptibilities in the network and on individual systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Vulnerability management

A

The process of finding and mitigating software vulnerabilities in computers and networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Vulnerability assessment

A

Base lining of the network to assess the current security state of computers and networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Vulnerability

A

Weakness in your computer network to assess the current security state of comprises, servers, network devices, and the entire network in general.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

VPN Concentrator

A

A hardware appliance that allows hundreds of users to connect to the network from remote locations via a VPN.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

VLAN hopping

A

The act of gaining access to traffic on other VLANs that would not normally be accessible by jumping from one VLAN to another.

24
Q

Vishing

A

A type of phishing attack that makes use of telephones and VoIP

25
Q

Virus

A

Code that runs on a computer without the user’s knowledge; it infects the computer when the code is accessed and executed.

26
Q

Virtualization

A

The creation of a virtual entity, as opposed to a true or actual entity.

27
Q

Virtual Private Network (VPN)

A

A connection between two or more computers or devices that are not on the same private network.

28
Q

Virtual Machine

A

Created by virtual software; VMs are images of operating systems or individual applications.

29
Q

Vampire tap

A

A device used to add computers to a 20BASE5 network. It pierces the cooper conductor of a coaxial cable and can also be used for malicious purposes.

30
Q

Zombie

A

Individual compromised computer in a botnet

31
Q

User Account Control (UAC)

A

A security component of windows that keeps every user (besides the actual Administrator account) in standard user mode instead of as an administrator with full administrative rights–even if they are a member of the Administrators group

32
Q

Uninterruptible Power Supply

A

Takes the functionality of a surge suppressor and combines that with a battery backup, protecting computers not only from surges and spikes, but also from sags, brown outs, and black outs.

33
Q

UDP Flood Attack

A

A similar attack to Fraggle. It uses the connection less User Datagram Protocol. It is enticing to attackers because it does not require a synchronization process.

34
Q

Typo squatting (URL hijacking)

A

A method used by attackers that takes advantages of typos when accessing websites. Instead of the expected website, a user ends up at a website with a similar name but often malicious content.

35
Q

Trusted Operating System

A

A system that adheres to criteria for multilevel security and meets government regulations.

36
Q

Trusted Computer System Evaluation Criteria (TCSEC)

A

A DoD standard that sees basic requirements for assessing the effectiveness of computer security access policies. Also known as the Orange Book.

37
Q

Trojan Horse

A

An application that appears to perform desired functions but is actually running malicious functions behind the scenes

38
Q

Triple DES (3DES)

A

Similar to DES but applies the cipher algorithm three times to each cipher block

39
Q

Transport Layer Security

A

The successor to SSL. provides secure internet communications. This is shown in browser as https

40
Q

Towers of Hanoi

A

A backup rotation scheme based on the mathematics of the towers of Hanoi puzzle. Uses three backup sets. For example, the first tape is used every second day, the second tape is used for every fourth day, and the third tape is used for every 8th day

41
Q

Time of day restrictions

A

When users logon hours are configured to restrict access to the network during certain times of the day and week

42
Q

Time bomb

A

A Trojan set off on a certain date

43
Q

Tickets

A

Part of the authentication process used by Kerberos

44
Q

Threat vector

A

The method a threat uses to gain access to a target computer.

45
Q

Threat modeling

A

A way of prioritizing threats to an application.

46
Q

Terminal Access Controller Access-Control System (TACACS)

A

A remote authentication protocol similar to RADIUS used more often in Unix networks

47
Q

Temporal Key Integrity Protocol

A

An algorithm used to secure wireless computer networks; meant as a replacement for WEP

48
Q

TEMPEST

A

Refers to the investigations of conducted emissions from electrical devices, which could be compromising to an organization.

49
Q

Teardrop attack

A

A type of DoS that sends mangled IP fragments with overlapping sized payloads to the target machine

50
Q

TCP/IP Hijacking

A

When a hacker takes over a TCP session between two computers without the need of a cookie or any other type of host access

51
Q

TCP reset attack

A

Sets the reset flag in a TCP header to 1, telling the respective computer to kill the TCP session immediately

52
Q

Tailgating

A

A type of piggybacking where an unauthorized person follows an authorized person into a secure area, without the authorized persons consent

53
Q

Systems Development Life Cycle

A

The process of creating systems and applications, and the methodologies used to do so

54
Q

SYN flood

A

A type of DoS where an attacker sends a large amount of SYN request packets to a server in an attempt to deny service

55
Q

Symmetric key algorithm

A

A class of cipher that uses identical or closely related keys for encryption and decryption

56
Q

Surge

A

Means there is an unexpected increase in the amount of voltage provided

57
Q

Supervisory control and data acquisition (SCADA)

A

System of hardware and software controls and monitors industrial systems such as HVAC