This class was created by Brainscape user Jonas Mayer. Visit their profile to learn more about the creator.

Decks in this class (20)

Introduction and Fundamentals
What are the cia security properties,
Name 5 security properties other ...,
Why can security not be implement...
5  cards
Security Principles
Name 10 security principles,
What is the principle of least pr...,
What is the principle of complete...
13  cards
Security, Usability, Psychology
What are humans weak at,
What are humans strong at,
Name five authentication factors
23  cards
Threat Modeling
What is a vulnerability,
What is an attack,
What is an attacker
16  cards
Web Application Security
What were the owasp top 6 from 2017,
What are some possible defenses t...,
What types of xss attacks are there
7  cards
System-Level Security: Buffer Overflows
Name some defenses ways to avoid ...
1  cards
Mobile Application Security
How does android sandbox applicat...,
What is different for dangerous p...,
What does an android apk contain
7  cards
Obfuscation
What is an informal definition of...,
What is an informal definition of...,
Name 2 attack scenarios addressed...
27  cards
Software-based Integrity Protection
What is the definition of a mate ...,
What are pre and post distributio...,
How does software based integrity...
27  cards
Hardware-based Integrity Protection
What are the three layers of the ...,
What are the two main security mo...,
How does attestation with a tpm work
9  cards
Side-channel Attacks
What is the definition of a side ...,
Name examples for possible side c...,
Which mathematical fact is the sq...
9  cards
Privacy Enhancing Technologies
Which requirement categories of a...,
What are key attributes vs quasi ...,
What is k anonymity
13  cards
Misconfiguration
What are the main factors which m...,
What is the idea behind scap secu...,
What is the idea behind the cente...
4  cards
Intrusion Detection
What is a definition for an intru...,
What are the 5 relevant aspects f...,
What different approaches are the...
7  cards
Fuzzing
How does fuzzing work,
Name the three different classes ...,
What different input generation t...
4  cards
Malware
What is a definition for malware,
How to make money with malware,
Name and describe the 10 types of...
15  cards
Pentesting
Name the three different categori...,
What are the steps of the typical...,
Name 3 non obvious parts of pente...
6  cards
More on Passwords
Describe the 4 presented solution...,
Name 4 alternatives to passwords,
Name 2 problems with sso
3  cards
Incident Response
What are csirt and cert,
What are the tasks listed in the ...,
What are the 6 steps of incident ...
3  cards
Risk analysis
What is a definition for risk,
What are three distinguishing cha...,
Name 4 strategies for handling risk
6  cards

More about
SecEng

  • Class purpose General learning

Learn faster with Brainscape on your web, iPhone, or Android device. Study Jonas Mayer's SecEng flashcards now!

How studying works.

Brainscape's adaptive web mobile flashcards system will drill you on your weaknesses, using a pattern guaranteed to help you learn more in less time.

Add your own flashcards.

Either request "Edit" access from the author, or make a copy of the class to edit as your own. And you can always create a totally new class of your own too!

What's Brainscape anyway?

Brainscape is a digital flashcards platform where you can find, create, share, and study any subject on the planet.

We use an adaptive study algorithm that is proven to help you learn faster and remember longer....

Looking for something else?

Make Flashcards