• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/38

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

38 Cards in this Set

  • Front
  • Back

unit of data routed between an origin and a destination on the internet

packet

directs internet traffic. Decides where to forward a packet

router

computer that provides data to other computers. Might serve data to a system on a LAN or WAN

Server

computer hardware or software that access a service made available by a server

CLient

takes advantage of vulnerability same day vulnerability generally known.

Zero Day exploit

repair job for vulnerability in program

patches

replicates itself and infects other programs or files by attaching itself. needs hos to spread

Virus

Spread on their own from computer to computer. Doesn't need a host. Stand alone application

worm

Software program that masks itself as a regular program. Must run fake program to activate. Overwrites parts of hard drive. Cant replicate.

Trojan

A network of private computers infected with malware and controlled as a group without the owners knowledge. Eg to send spam messages

Botnet

Attacks multiple systems. Flood the bandwidth or resources of a targeted system. Usually one or more web servers.

Distributed denial of service (DDoS)

Security mechanism for separating and running a program that is untested or un-trusted without risking host machine.

Sandboxing

tricking people into breaking normal security protocol

Social engineering

tricking people into releasing their own personal information such as SS#

Phishing (email)


Smishing (sms)


Vishing( phone call)

Used to encrypt data. Generating a value or values from a text using a mathematical algorithm

hashing

adding a secret code to every password after it has been encrypted

salting

precomputed table for reversing hashing. cracking hashes

rainbow table

method of computer access control in which a user is granted access after presenting several pieces of evidence

multifactor authentication

evidence based knowledge about an existing or emerging threat

Threat intelligence

Network security system that monitors and controls the incoming and outgoing network traffic

Firewall

technology that exams network traffic flow to prevent vulnerability exploits

Intrusion prevention system (IPS)

detects and destroys computer viruses

Anti-virus (AV)

protects web applications/servers from attak

Web application firewall (WAF)

protects computers from a full spectrum of modern cyber attacks. Every process and every point.

Next generation anti-virus (NGAV)

strategy for making sure end users don't send sensitive or critical information outside the corporate network

Data loss prevention ( DLP)

Disguising origin of email

Spoofs, look-alike domains, or display name deception

Technology that creates a safe and encrypted connection over a less secure network, such as the internet.

VPN

software kit designed to run on web servers, with the purpose of identifying software vulnerabilities in client machines communicating with it, and discovering and exploiting vulnerabilities to upload and execute malicious code on the client.

Exploit kit

disseminating the tasks and associated privileges for a specific security process among multiple people

Separation of duties

the practice of limiting access to the minimal level that will allow normal functioning

principle of least privilege (POLP)

the conversion of electronic data into another form, called ciphertext, which cannot be easily understood by anyone except authorized parties.

Encryption

key pair is mathematically related, whatever is encrypted



Public key Vs private key

type of encryption where the same key is used to encrypt and decrypt the message

Symmetric encryption

Encryption where keys come in pairs. What one key encrypts, only the other can decrypt.

Asymmetric encryption

software testing method in which the internal structure/ design/ implementation of the item being tested is NOT known to the tester

Black box testing

software testing method in which the internal structure/ design/ implementation of the item being tested is known to the tester

White box testing

total sum of the vulnerabilities in a given computing device or network that are accessible to a hacker.

attack surface

network attack in which an unauthorized person gains access to a network and stays there undetected for a long period of time

Advanced persistent threats