Definitions Flashcards

1
Q

Threats

A

Potential for violation of security, which exists when there is a circumstance, capability, action, or event that could breach security and cause harm.
Threat is a possible danger that exploits a vulnerability.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Attack

A

An assault on system security that derives from an intelligent threat; that is, an intelligent act that is a deliberate attempt to evade security services and violate the security policy of a system

The actual action. They already compromised the vulnerability.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Active Attack

A

Attempts to alter system resources

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Passive Attack

A

learn or make use of information from system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Cybersecurity

A

Defending computers, servers from malicious attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Cyber Defense

A

Setting up your system where it’s resilient to attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Information Security

A

prevention of unauthorized access during time of storing or transferring from one to another

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Virus

A

merges to other programs and files

modifies programs and files

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Worm

A

self-replicate and use an infected computer to infect others

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Spyware

A

spy software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

adware

A

show different ads on screen

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

trojan

A

camoflaged harmless file but then works as gateway to access system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

ransomware

A

hacker encrypts files and payment is required to unlock

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Denial of service

A

flooding network with traffic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

non repudiation

A

prevent sender or receiver from denying transmitted message

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

_______ are a chain of a large number of devices connected to the Internet that help attackers to control victim machine

A

Botnets

17
Q

Phishing attacks includes:

A

Fraud and Evil Twin

18
Q

Message authentication is a service beyond ______

A

Message integrity

19
Q

In message signing, transmitted message is encrypted using ____

A

sender

20
Q

digital signature needs a ________ for encryption

A

Public-key algorithm

21
Q

hash function guarantees integrity of a message. It guarantees that message has not been _______

A

Changed/modified

22
Q

sender must not be able to deny sending a message that was sent, is known as

A

Message nonrepudiation

23
Q

symmetric key encryption uses _____

A

Only One Key

24
Q

HTTP connection uses port __ whereas HTTPS uses port ___ and invokes SSL

A

80, 443

25
Q

an event that appears to be a risk but turns out not to be one is called a ____

A

false positive

26
Q

Security risk of P2P network

A

virus can be quickly transmitted

27
Q

FTP uses which 2 ports

A

20 and 21

28
Q

format of data of transport layer

A

Segment

29
Q

format of data of data link layer

A

frames