CompSecFinal Flashcards
(60 cards)
Magnetic tapes came to the forefront as a storage medium during this “chilly” period in American history.
Cold War Era
The governmental agency that became the backbone of the internet.
ARPA/DARPA
This Navy read admiral was credited with finding the first computer ‘bug’ as well as developing the first interpreter so people could develop software in a more native language rather than machine code.
Grace Hopper
This was one of the first fully electric and reprogrammable computers developed at the university of Pennsylvania to calculate military ballistic trajectories.
ENIAC
Name the two main figures that worked at Bletchley Park during WWII to decrypt the enigma and Lorenz Electro-Mechanical Rotor Cipher Machines.
Alan Turing and Gordon Welchman
These type of keys can be used to defeat door locks with a ‘whack’.
Bump keys
This two door entry system tries to prevent ‘piggybacking’.
Mantrap
Putting razorwire on top of your 10 foot high fence would shift your security posture from deterrent to this other more severe option.
Preventative
These security cameras no longer harken to their namesake as they are often put on the general network where they can be exposed to hacking.
Close circuit television
We learned that proper disposal of paperwork as well as old storage media is important to thwart this attack vector.
Dumpster diving
The concept where you should give users only the permissions they need.
Least privilege
A vulnerability for which there currently is no patch
Zero day
When someone changes position with an organization but their access from their previous position is not revoked … even though they no longer need it.
Creeping privileges
A malicious organization, often backed by government funding, that specializes on delving deep into your network and maintaining persistent access to perpetrate exfiltration and more heinous attacks.
Advanced persistent threats (APTS)
Hiding secret messages inside of other file types; such as images
Steganography
This is the 3-letter core ‘shape’ of information security
C.I.A. Triangle
This is what the AAA of infosec stands for.
Authentication, Authorization, and Accounting
There are 3 group policies in this category that are instrumental in thwarting brute-force attacks.
Account-lockout
Bob, from accounting, perpetrating an SQL injection attack against the corporate database via a web accessible frontend would be this type of entity in a threat landscape; not something as specific as a hacker but more specific than just a general threat.
Threat agent
The 3 something you ____’s that go into multifactor authentication
1] something you know
2] something you are
3] something you have
A hash this type of directional function; cannot be reversed
One-way
This term refers to a small change in the input text resulting in a large change in the hashed value.
High amplification
This is probably the most popular hashing algorithm to date and comes in varieties of 1, 2, and 3 while 3 still has not had wide implementation
SHA
These are pre-hashed passwords that can help speedup password attacks by already having done the computational intensive calculations for common passwords
Rainbow tables