This class was created by Brainscape user Seamus Bonner. Visit their profile to learn more about the creator.

Decks in this class (19)

Introduction
What is the aim of cyber security,
How are computers protected from ...,
What are the five functions of se...
28  cards
Cryptography
When is a message m vulnerable in...,
What is encryption,
What is decryption
41  cards
Hashing
What is a hash function,
Why is this one way mapping useful,
What are the properties required ...
9  cards
Digital Signatures and PKI
What is a digital signature,
Who verifies a digital signature,
What properties must digital cert...
25  cards
Vulnerabilities
What is a threat,
What is an exploit,
What is malware
26  cards
Password Authentication
What are the two standard securit...,
What is an entity,
What do we need to determine abou...
24  cards
Multi-Level Authentication
What is multi level authentication,
What are the different methods of...,
What are the drawbacks of visual ...
15  cards
Biometrics
What are biometrics,
What are the issues with biometrics,
Where are biometrics usually used
19  cards
Access Control
What is access control,
What are the forms of access control,
What does access to a system mean
45  cards
Security Models
What is a policy,
How does a reference monitor fit ...,
What does the security kernel do ...
30  cards
Secure Communications and Application Vulnerabilities
How are secure communications ach...,
What is the layered model of netw...,
Where are security protocols impl...
38  cards
Steganography
What is steganography,
What mediums can be used for steg...,
How are images constructed
12  cards
Needham-Shroeder & Kerberos
How does needham schroeder work,
What are nonces used for,
What are the limitations of using...
20  cards
IPSec
What protocol was tls based on,
What algorithms does tls use for ...,
How is authentication done in tls
57  cards
Network Defence
What is a firewall,
What can firewalls do,
How are decisions made on where t...
46  cards
Intelligent Intrusion Detection Systems
What are the types of ids,
How does host based ids work,
How does network based ids work
31  cards
WiFi and Cloud Security
What is wpa,
What did wpa have a problem with,
What was developed to strengthen wpa
30  cards
Privacy and Social Networks
What is privacy,
What is the right to be forgotten,
How can individiauls stay private...
18  cards
Risk Assessment
What are the three processes of risk,
How is risk calculated,
What are the four categorisations...
8  cards

More about
CS4203: Computer Security

  • Class purpose General learning

Learn faster with Brainscape on your web, iPhone, or Android device. Study Seamus Bonner's CS4203: Computer Security flashcards for their University of St Andrews class now!

How studying works.

Brainscape's adaptive web mobile flashcards system will drill you on your weaknesses, using a pattern guaranteed to help you learn more in less time.

Add your own flashcards.

Either request "Edit" access from the author, or make a copy of the class to edit as your own. And you can always create a totally new class of your own too!

What's Brainscape anyway?

Brainscape is a digital flashcards platform where you can find, create, share, and study any subject on the planet.

We use an adaptive study algorithm that is proven to help you learn faster and remember longer....

Looking for something else?

CS4203 Computer Security
  • 23 decks
  • 760 flashcards
  • 81 learners
Decks: Lecture 0 17th September 2019, Lecture 1 18th September 2019, Lecture 2 20th September 2019, And more!
Security+ Practice exams
  • 38 decks
  • 2776 flashcards
  • 170 learners
Decks: Professor Messer Practice Questions, Comptia Practice Questions, Comptia Review Questions, And more!
Computer Science
  • 33 decks
  • 1991 flashcards
  • 37 learners
Decks: 11 Processors, 11 Processors Extra, 12 Software, And more!
Make Flashcards