Week 1 Flashcards

1
Q

CIA

A

Conformation, Integrity, and Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Integrity

A

Keeping data accurate and untampered with

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Confidentiality

A

Keep data hidden. Only need to know basis for files.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Availability

A

The information we have is readily accessible to those people that should have it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Risk

A

The possibility of suffering a loss in the event of an attack on the system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Vulnerability

A

A flaw in the system that could be exploited to compromise the system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

0-day vulnerability (zero day)

A

A vulnerability that is not known to the software developer or vendor, but is known to an attacker

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Exploit

A

Software that is used to take advantage of a security bug or vulnerability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Threat

A

The possibility of danger that could exploit a vulnerability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Hacker

A

Someone who attempts to break into or exploit a system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Attack

A

An actual attempt at causing harm to a system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Black hat hacker

A

Someone who exploits an vulnerability in a system for malicious purposes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

White hat hacker

A

Someone who exploits an vulnerability in a system to alert the devs so they can fix it before someone tries to exploit it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Malware

A

A type of malicious software that can be used to obtain your sensitive information, or delete or modify files

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Common types of malware

A

Viruses, worms, adware, spyware, Trojans, root kids, backdoors, botnets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Adware

A

Software that displays advertisements and collects data

17
Q

Trojan

A

Malware that disguises itself as one thing but does something else

18
Q

Spyware

A

Malware meant to spy on you

19
Q

Keylogger

A

Common type of spy ware that’s used to record every keystroke you make

20
Q

Ransomware

A

Type of attack that holds your data or system hostage until you pay some sort of ransom

21
Q

Botnets

A

Designed to utilize the power of the internet connected machines to perform some distributed function

22
Q

Backdoor

A

A way to get into a system if the other methods to get into the system aren’t allowed

23
Q

Rootkit

A

A collection of software or tools that an Admin would use

24
Q

Logic bomb

A

Type of malware that’s intentionally installed

25
DNS Cache Poisoning attack
Tricks a DNS server into accepting a fake DNS record that will point you to a compromised DNS server. Then it feeds you take DNS addresses when you try to access legitimate websites It can spread to other networks
26
Man in the middle attack
An attack that places the attacker in the middle of two hosts that think they're communicating directly with each other
27
Rogue AP
An access point that is installed on the network without the network administrator's knowledge A type of man in the middle attack
28
Denial of Service (DoS) attack
An attack that tries to prevent access to a service for legitimate users by overwhelming the network or server
29
Ping of death (POD)
A type of DoS attack where a malformed ping is sent to a computer. The ping is larger than what the internet protocol was made to handle, so a buffer overflow occurs, and this causes the system to crash and potentially allow the execution of malicious code
30
Ping flood
Sends ICMP echo requests to a computer till it's overwhelmed and taken down
31
Distributed denial of service attack (DDoS)
A DoS attack using multiple systems
32
Cross site scripting (XSS) attacks
A type of injection attack where the attacker can insert malicious code and target the user or the service
33
Password attack
Utilize software like password-crackers that try and guess your password
34
Social engineering
Am attack method that relies heavily on interactions with humans instead of computers
35
Spoofing
A source is !masquerading around as something else
36
Tailgating
Gaining access into a restricted area or building by following a real employee in