This class was created by Brainscape user Elsa N. Visit their profile to learn more about the creator.

Decks in this class (21)

SB 3: Security Basics
Briefly explain confidentiality i...,
Briefly explain integrity in secu...,
Briefly explain availability in s...
9  cards
SB 4: A Language for Security
Describe state and protection state,
What is an access control matrix,
Describe the access control matri...
3  cards
SB 5: Policy Languages and Policy Types
What is a security policy,
Name three types od,
What is a secure system
19  cards
SB 6: Basics of Cryptography
What are the two types of transfo...,
What can cryptography provide,
What does kerckhoff s principle say
11  cards
SB 7: Cryptographic Methods and Weaknesses
Discuss the one time pad what are...,
What is steganography,
What is traffic analysis
6  cards
SB 8: Public Key Cryptography
What is asymmetrical cryptography,
Explain rsa,
What is a public key cryptography...
11  cards
SB 9: Trust in Keys
What is the difference between a ...,
How can keys be exchanged,
What is a certificate
14  cards
SB 10: Cryptography Variants
What is a stream cipher,
What is a block cipher,
What are the security implication...
7  cards
SB 11: Authentication and Passwords
What does authentication stand fo...,
What is salting,
What is the difference between an...
6  cards
SB 12: More Authentication
What are some issues with remote ...,
What is the difference between a ...,
Mention a few different biometric...
4  cards
SB 13: Development of Authentication and protocols
What is a one time password,
Describe the challenge response m...,
What is hardware supported challe...
3  cards
SB 14: Access Control
What is an access control list,
What is a capability based access...,
What is the major difference betw...
7  cards
SB 15: Malware
What is a trapdoor,
What is a covert channel,
What is a trojan horse
14  cards
SB 16: Malware Defense
What is static analysis,
What is behavioral analysis,
What is statistical analysis
8  cards
SB 17: Attacks
What does incident prevention mean,
What is jailing,
What is diversity
16  cards
SB 18: OS Security
How can you provide assurances wh...,
What is a fat finger error,
What is a security objective
16  cards
SB 19: Network Security
What is and end to end protocol v...,
What is traffic analysis,
What is a firewall
6  cards
SB 22: Design Principles for Security
What is the underlying idea of de...,
What is the principle of least pr...,
Principle of least authority
11  cards
SB 23: Software Vulnerabilities
What is the pa model,
What can happen if privileges are...,
Why is it critical to verify the ...
10  cards
SB 24: Privacy
Discuss the benefits of anonymity,
Discuss the drawbacks associated ...,
Discuss anonymity in regards to i...
3  cards
SB 25: Privacy Enhancement
What is a remailer,
What is onion routing,
What is an anonymizer
4  cards

More about
IntroSec

  • Class purpose General learning

Learn faster with Brainscape on your web, iPhone, or Android device. Study Elsa N's IntroSec flashcards now!

How studying works.

Brainscape's adaptive web mobile flashcards system will drill you on your weaknesses, using a pattern guaranteed to help you learn more in less time.

Add your own flashcards.

Either request "Edit" access from the author, or make a copy of the class to edit as your own. And you can always create a totally new class of your own too!

What's Brainscape anyway?

Brainscape is a digital flashcards platform where you can find, create, share, and study any subject on the planet.

We use an adaptive study algorithm that is proven to help you learn faster and remember longer....

Looking for something else?

Make Flashcards