Basic Terminology Flashcards
(32 cards)
Used to refer to a list of banned IP addresses, applications or users.
Blacklist
The exact opposite of a blacklist
Whitelist
The process of creating a fake online profile in order to trick people into believing they are someone else for financial gain.
Cat fishing
The process of proving an individual is who they claim to be.
Authentication
The activity of analyzing and/or searching through data in order to find items of relevance, significance or value
Data Mining
This is used to describe a threat that is unknown to security specialists and has not been addressed.
Zero Day
This refers to the likelihood of something bad happening. It requires both a threat and a vulnerability to exist.
Risk
These are weaknesses within a system or network that can be exploited to cause us harm.
Vulnerabilities
A clearly defined way to breach the security of a system.
Exploit
This generally refers to anything that has the potential to cause our data, systems and networks harm.
Threat
This describes a target that may attract an above average level of attention from an attacker.
Hack Value
This is the concept that once an action is carried out by a party it cannot be denied by that same party.
Non-Repudiation
A malicious code that is only triggered when a set of conditions are met
Logic Bomb
A set of rules that determine how computers communicate with each otther. Also govern how an internet document gets transmitted to a computer screen. It determines what part ofthe converstation comes at which time and how the converstation ends
Protocol
Determines how browers and web servers communicate. Major protocol for the internet. The connection is dropped once the request has been made - “stateless system”
HTTP (Hyper Text Transfer Protocol)
The connection is dropped once the request has been made. Only is active when trying to connect to a web server
Stateless System
Secure Version of HTTP
HTTPS (Hyper Text Transfer Protocol Secured)
Used by HTTPS to provide encryption
SSL - Secure Sockets Layer
Used specifically by programmers and network administrators
SSH - Secure Shell
Governes how files are transmitted from one computer to another
FTP - File Transfer Protocol
Governes how files are transmitted from one computer to another that is secure.
SFTP - Secure File Transfer Protocol
Controls how internet messages are sent
IMAP - Internet Message Access Protocol
Governs how emails are sent and received
SMPT - Simple Mail Transfer Protocol
Pieces of text that are stored on your hard disks and then later retrieve it. Their purpose is to identify a user, check for their past activity on the website and use this record to provide the most relevant information to the user
Web Cookies