Cyber Flashcards
(26 cards)
Whats the CIA Triad?
Confidentiality, Integrity, Availability
CIA Triad - What is confidentiality?
Ensuring that information is accessible only to those authorised to have access
CIA Triad - What is Integrity?
Protecting information from being altered by unauthorised parties
CIA Triad - What is Availability?
Ensuring that information and resources are available when needed
What is the OSI 7 layer model?
The OSI Model describes how data travels from a physical medium to an application on a network
Whats are the 7 layers in the OSI model?
Physical, Data Link, Network, Transport, Session, Presentation, Application
What does the physical layer do?
Deals with the hardware and transmission of raw data (e.g., cables, switches)
What does the Data Link layer do?
Handles MAC addresses, switches, and error detection
What does the Network layer do?
Routes data using IP addresses (e.g., routers)
What does the Transport layer do?
Ensures reliable data transfer with protocols like TCP and UDP
What does the Session layer do?
Manages sessions or connections between applications
What does the Presentation layer do?
Translates data formats (e.g., encryption, compression)
What does the Application layer do?
Interfaces with the end-user (e.g., HTTP, FTP)
What is the TCP/IP Stack?
Link, Internet, Transport, and Application
Name 4 common networking protocols
HTTP/HTTPS, FTP/SFTP, SSH, DNS
What is Public Key Cryptography?
Involves a pair of keys: a public key (shared openly) and a private key (kept secret)
What is SQL Injection?
Exploiting user input fields to inject malicious SQL commands
What is Cross-Site Scripting (XSS)?
Injecting malicious scripts into web pages viewed by other users
What is Cross-Site Request Forgery (CSRF)?
Forcing a user to execute unwanted actions on a web application where they’re authenticated.
What is the 5 steps to a Penetration attack?
Reconnaissance (Gathering target into), Scanning (Identifying open ports), Exploitation (attempting the exploit), Post-Exploitation (assessing the impact), Reporting.
3 Types of Attacks?
Social Engineering, DDoS (Distributed Denial), Man-in-the-Middle
What is the windows registry?
A hierarchical database storing configuration settings and options for the operating system and applications
What is the windows Event Logs?
It logs events like logins, system errors, application failures, and security events
Name some forensics tools
Autopsy for disk and file system analysis; Volatility for memory analysis