Week 3: Flashcards

You may prefer our related Brainscape-certified flashcards:
1
Q

Inline CSS

A

Inline CSS:
Inline CSS contains the CSS property in the body section attached with element is known as inline CSS. This kind of style is specified within an HTML tag using the style attribute

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Internal CSS

A

This can be used when a single HTML document must be styled uniquely. The CSS rule set should be within the HTML file in the head section i.e the CSS is embedded within the HTML file.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

External CSS:

A

External CSS contains separate CSS file which contains only style property with the help of tag attributes (For example class, id, heading, … etc). CSS property written in a separate file with .css extension and should be linked to the HTML document usinglink
tag. This means that for each element, style can be set only once and that will be applied across web pages.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is a cyberattack?

A

any offensive manuever that targets information systems, networks, infrastructures and personal devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Attacker

A

can be a person or process that attempts to access data, functions or other restricted areas of the system withoUt authorization. Potentially with malicious intent.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Cyberattacks range

A
  • Cyberattacks can range from installing spyware on a personal computer to attempting to destroy the infrasture of entire nations
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

types of Cyberattacks

A

Physical security threat

password attack

social engineering

spoofing

Man in the middle attack

malware (and malicious mobile apps)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Physical attack?

A

When your stuff is PHYSICALL stolen

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Protecting from a physical cyber attack?

A
  • How to stay safe?
    • encrypted hard drives, USBs
    • Never write passwords on post-its
    • never leave system unattended, unlocked and unattended (phones too) _
    • have proper backup and remote wipes services
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Password attack

A

Password Attack:

  • hackers can use programs to create/try millions of passwords in seconds
    • brute force - try with all combinations of characters/number/symbols
    • dictionary words: try all possible combinations of basic words
    • credential stuffing: try various combinations of previous compromised passwords
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Multifactor authentification process

A

requires TWO different aspects of credentials from the

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

types of credentials

A
  • Biometric (fingerprints, facial ID)
  • Something you know (mot de pass, or pin)
  • Something you have - another device, smartphone, email address, smart card)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Social engineering attack:

A

psychological manipulation of people into performing actions or divulging confidential information. *eg. bank account, ssn, financial info.

Main properties:

  • Disguise/misrepresentation (spoofing)
  • Often creates a sense of urgency - Person must do something or accounts will be shut down
  • Comes in many forms: Phishing, smishing, vising, baiting, tailgating
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Phishing (most common attack)

A
  • attacker sends a MESSAGE designed to trick a human victim to
    • reveal info to the attacker
    • clicks on links or open attachments that install ransomware
    • direct you to fake websites to reset password
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Spoofing

A

In the context of information security, and especially network security, a spoofing attack is a situation in which a person or program successfully identifies as another by falsifying data, to gain an illegitimate advantage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Man in the middle

A

A man in the middle (MITM) attack is a general term for when a perpetrator positions himself in a conversation between a user and an application—either to eavesdrop or to impersonate one of the parties, making it appear as if a normal exchange of information is underway.

17
Q

Malware

A

As software designed to interfere with a computer’s normal functioning, malware is a blanket term for viruses, trojans, and other destructive computer programs threat actors use to infect systems and networks in order to gain access to sensitive information.

18
Q

What is CSS

A
  • Cascading Style sheets
19
Q

what is CSS used for?

A

Styling HTML, gives the appearance to HTML websites