1 Flashcards

(45 cards)

1
Q

What is confidentiality in cybersecurity?

A

Protecting info from unauthorized access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What does integrity ensure?

A

データの整合性

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is non-repudiation?

A

Preventing someone from denying their actions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What does authenticity verify?

A

Verifying the legitimacy of users or data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is the principle of reciprocity in influence?

A

Give a target gifts or information in the hope that they reciprocate in a similar way

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is pharming?

A

An attack that redirects users from a legitimate website to a fake one.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is the ‘heart’ of an operating system?

A

Kernel

Manages hardware resources (disks, RAM, screen, keyboard, network)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the home directory symbol?

A

~

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is the root directory symbol?

A

/

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are ‘vim’ or ‘nano’ used for?

A

Edit text files

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What does ‘ssh’ do?

A

Run a secure shell to connect to a remote server’s command line

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What does ‘less’ do?

A

View the contents of a file

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is ‘john’?

A

Password cracking tool

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is ‘nikto’?

A

Web server vulnerability scanner

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is ‘hydra’?

A

Service brute force attacker

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What does ISO 27000 refer to?

A

Information Security Management Systems (ISMS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What does ISO 31000 refer to?

A

Risk management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is a cipher?

A

An algorithm for encrypting/decrypting data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What is cryptanalysis?

A

The study of breaking encryption

20
Q

What is cryptology?

A

Study of cryptography and cryptanalysis

21
Q

What is confusion in cryptography?

A

A technique to obscure the relationship between the key and the ciphertext

22
Q

What is diffusion in cryptography?

A

A technique to spread the influence of a single plaintext digit over many ciphertext digits

23
Q

What does MACS stand for?

A

Message Authentication Codes

24
Q

What does PKI stand for?

A

Public Key Infrastructure

25
What does TOFU stand for?
Trust of first use
26
What is deterministic in cryptography?
An algorithm that produces the same output for the same input
27
What is pre-image resistance?
出力から入力を予測することが難しいこと
28
What is second-preimage resistance?
A property that makes it hard to find a different input that hashes to the same output
29
What is collision resistance?
A property that makes it hard to find two different inputs that produce the same output
30
What does PRF stand for?
Pseudo-Random Function
31
What does PRP stand for?
Pseudo-Random Permutation
32
What is the Zeus Trojan horse?
Windows, steal information, Awakes when a particular site is accessed
33
What is PsybOt?
Linux based ADSL routers, exploits poorly configured devices
34
What are worms in cybersecurity?
Spread automatically、とてもはやい
35
What is a logic bomb?
Virusとは違い拡散・自己複製しない
36
What is scareware?
Malware that uses fear to manipulate users
37
What is real-time monitoring?
alert system operaters to immediate concerns
38
What is an exploit?
脆弱性を実際に悪用するコードや技術的手法。
39
What is scarcity in influence?
A sense of urgency and limited resources
40
What is 'shasum'?
A command-line utility for generating SHA checksums
41
PRF?
infinite start points, but fixed end point
42
PRP
fixed start points, fixed end point
43
Virus
spread and damage with conditions、ファイルに寄生
44
Logging
can provide deeper level of audit
45
Reciprocity
互恵性、返報性