Basic Terminology Flashcards

(32 cards)

1
Q

Used to refer to a list of banned IP addresses, applications or users.

A

Blacklist

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

The exact opposite of a blacklist

A

Whitelist

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

The process of creating a fake online profile in order to trick people into believing they are someone else for financial gain.

A

Cat fishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

The process of proving an individual is who they claim to be.

A

Authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

The activity of analyzing and/or searching through data in order to find items of relevance, significance or value

A

Data Mining

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

This is used to describe a threat that is unknown to security specialists and has not been addressed.

A

Zero Day

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

This refers to the likelihood of something bad happening. It requires both a threat and a vulnerability to exist.

A

Risk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

These are weaknesses within a system or network that can be exploited to cause us harm.

A

Vulnerabilities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A clearly defined way to breach the security of a system.

A

Exploit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

This generally refers to anything that has the potential to cause our data, systems and networks harm.

A

Threat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

This describes a target that may attract an above average level of attention from an attacker.

A

Hack Value

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

This is the concept that once an action is carried out by a party it cannot be denied by that same party.

A

Non-Repudiation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

A malicious code that is only triggered when a set of conditions are met

A

Logic Bomb

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

A set of rules that determine how computers communicate with each otther. Also govern how an internet document gets transmitted to a computer screen. It determines what part ofthe converstation comes at which time and how the converstation ends

A

Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Determines how browers and web servers communicate. Major protocol for the internet. The connection is dropped once the request has been made - “stateless system”

A

HTTP (Hyper Text Transfer Protocol)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

The connection is dropped once the request has been made. Only is active when trying to connect to a web server

A

Stateless System

17
Q

Secure Version of HTTP

A

HTTPS (Hyper Text Transfer Protocol Secured)

18
Q

Used by HTTPS to provide encryption

A

SSL - Secure Sockets Layer

19
Q

Used specifically by programmers and network administrators

A

SSH - Secure Shell

20
Q

Governes how files are transmitted from one computer to another

A

FTP - File Transfer Protocol

21
Q

Governes how files are transmitted from one computer to another that is secure.

A

SFTP - Secure File Transfer Protocol

22
Q

Controls how internet messages are sent

A

IMAP - Internet Message Access Protocol

23
Q

Governs how emails are sent and received

A

SMPT - Simple Mail Transfer Protocol

24
Q

Pieces of text that are stored on your hard disks and then later retrieve it. Their purpose is to identify a user, check for their past activity on the website and use this record to provide the most relevant information to the user

25
Can store your shopping cart on e-commerce sites
Session Cookies
26
Divides a message or file into packets that are transmitted over the internet and then reassembled when destination is reached
TCP - Transmisison Control Protocol
27
Responsible for the address of each packet so it is sent to the correct destination
IP - Internet Protocol
28
A suite of protocols used to interconnect network devices on the internet. Divided into 4 major layers
TCP/IP
29
Consists of protocls that operate on a link that connects hosts on a network e.g Ethernet - 1 of the major layers of TCP/IP
Datalink Layer
30
Connects independent networks together, this is where you have IP itself - 1 of the major layers of TCP/IP
Internet/Networking Layer
31
Handles communication between hosts, this is where the TCP is located - 1 of the major layers of TCP/IP
Transport Layer
32
Standardizes data exchange for applications e.g HTTP, FTP - 1 of the major layers of TCP/IP
Application Layer