Final Review Flashcards

(38 cards)

1
Q

CIA

A

Confidentiality - preventing unauthorized access to sensitive information

Integritiy - assurance that data is not altered/destroyed unauthorized

Availability - continuous operation of computing systems (DOS prevention)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Exploit

A

Any attack that takes advantage of vulnerabilities in applications, networks, or hardware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

T/F New exploits tend to be variations of common past exploits

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Cracker

A

A person/entity that attempts to gain unauthorized access to a computer system, network, or data with malicious intent

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Hacker

A

White hat - ethical cybersecurity
Black hat - cybercriminals
Gray hat - between the lines

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

DLP

A

Data Loss Prevention - software designed to detect to detect data leaks or breaches

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

IDS/IPS

A

Intrusion Detection / Prevention System

Located behind the firewall on protected network.
Detect and log abnormal traffic based on programmed signatures (data pattern).
Response capability based on signature = IPS.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Web Content Filtering

A

Originally intended to stop people from getting to specific websites / limit inappropriate content getting to children, now is often used to block malware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Hacker Goals

A

Reconnaissance - scanning, fingerprinting, enumerating

Exploit - steal/use/destroy info, stop/slow access, extortion

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Hacker Motivation

A

Profit
Revenge
Challenge
Vandalism

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Causes of Threats

A

Technology weakness
Configuration weakness
Policy weakness
Human error

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

PHP

A

O - Personal Home Pages
N - Php: Hypertext Preprocessor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

PHP Key Benefits

A

Familiarity, Simplicity, Flexibility, Open Source

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

PHP Tag

A

<?php … ?>
or
<? … ?>

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

T/F You can have as many php blocks as you need spread throughout your HTML

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

phpinfo( )

A

A built-in function that outputs information about PHP’s configuration

17
Q

print vs echo

A

print can return an error code (int), echo returns void

18
Q

PHP Identifiers

A

Can begin with letter or underscore, be any length, consist of ASCII characters 127-255, case sensitive characters

19
Q

PHP Variables

A

preceeded by a $

20
Q

What is <?=$x?>

A

If short tags are enabled in php.ini, it is the short form of
<?php echo $x; ?>

21
Q

Are there problems with Short Tags?

A

Unexpected behaviors, SQL injection vulnerabilities, Loose comparisons issues

22
Q

T/F You can reassign variables dynamically?

23
Q

How to Get/Set a variable’s type?

A

.gettype( ) and .settype( )

24
Q

What are Variable Variables?

A

Allow you to use the value of one variable as the name of another. Defined by a variable name preceded by another $
eg. $varname = “student_num”;
$$varname = 121131;
// means $student_num = 121131;

25
PHP String Concatenation
. instead of +
26
Primary Functions of Cryptography
Confidentiality - Cannot be read by others Authentication - Mathematically prove the source of the data Integrity - Assurance the data has not been altered Nonrepudiation - verify the identity of the sender
27
Encryption vs Hashing
Encryption - two way Hashing - one way
28
Symmetric Algorithms
Same key, requires sender & receiver to agree on a key, AKA secret key, single-key, or one-key algorithms
29
Asymmetric Encryption
Different keys. Encrypt with private, decrypt with public. Recommended minimum length is now 2048-bit
30
Digital Signatures
Utilize hash functions to create and verify digital signatures. Provides non repudiation and authentication. Issue is that computation is done by the computer, not the person.
31
Digital Certificates
Electronic document attached to a public key by a trusted third party which provides proof that the public key belongs to a legitimate owner and has not been compromised. Consist of cert. owner's public key, unique info, and digital signatures of an endorser (trusted third party)
32
Nonrepudiation
Practice of using a trusted, third-party entity to verify the authenticity of a party who sends a message
33
TLS
Transport Layer Security Uses cryptography to enable encryption of data between two parties and digital certificates to enable authentication of the parties involved in a secure transaction.
34
Hashing
Method used to verify data integrity. Uses variable-length input that is converted to a fixed-length output string. Ex. digital signatures and secure storing of passwords
35
Zero-Day Exploit
Technique used to attack systems that have a vulnerability that is unknown to the public, or "zero days" old
36
Hardening
Process of modifying an OS's default configuration to make it more secure to outside threats. Remove unnecessary programs / services, apply patches to eliminate known vulnerabilities
37
Change Management Process
Document existing state Determine impact of change Seek approval for change Test the change Document the changes Review proposed changes Schedule change and notify affected users Deploy the change Test and Report Success Close the change ticket
38
Obfuscation
The obscuring of intended meaning in communication, making the message confusing, willfully ambiguous, or harder to understand. Intentional or unintentional.