Introduction To Ethical Hacking Flashcards
(63 cards)
What is hack value ?
An items worth or interest to hacker
What is a zero-day attack ?
Threats and vulnerabilities that can be exploited before a fix is ready
What is a vulnerability ?
It refers to a weakpoint in any system or network
What is an exploit ?
A breach of a systems security through vulnerabilities
What is doxing ?
Publishing information about an individual
What is meant by the term payload ?
Actual section of the information or data in a frame as opposed to metadata
What is a bot ?
Software designed to control the target remotely and to execute predefined tasks
What are the three elements of Information Security ?
Confidentiality, Integrity and Availability
What is confidentiality ?
Only authorized personnel can see or work with digital assets
What is integrity ?
Ensuring assets have not been altered in an unauthorised manner
What is availability ?
Ensuring timely and reliable access to systems
What are the security controls for Confidentiality ?
Encryption, Authentication and Access Control
What are the security controls for Integrity
Audit Logs, Quality Assurance
What are the security controls for Availability
Business Continuity Plans, Backup storage, sufficient capacity
What is non repudiation ?
The assurance of communication and its authenticity so that the sender is unable to deny the sent message
What controls enforce Non Repudiation
Digital signatures, digital contracts
What three aspects of a system measure its level of security
Security, Usability and Functionality
What are the three attack vectors
Motive, Method, Vulnerability
What are some of the common motives for an attack
financial gain, religious or political, disruption, manipulation of data
What is an advance persistent threat ?
The process of stealing information through a continuous procedure
Whats the difference between viruses and worms
Worms have the ability to replicate
What is insider threat ?
A threat originating from a user within the system
What is a botnet ?
Groups of bots connected together through the internet to perform a distributed attack continuously
What are the main threat categories ?
Network, Host, Application