midterm terms Flashcards

(42 cards)

1
Q

phishing

A

tricking people to give away personal information (usually by email)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

advanced encryption standards

A

encryption standards established in 2001 and supports 128, 192, 256 bits

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

hash

A

using an algorithm, sorts data with a label so by the end of transit, it’ll be known if the data was tampered with

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

what is a virus

A

a malicious software that attaches itself to a host

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

ransomware

A

a type of virus that disables the system for ransom

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

worm

A

a complete program that copies itself from one computer to another

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

stream cypher

A

encode and decode the message one character (byte) at a time

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

block cypher

A

encode and decode the message many characters (bytes) at a time, usually 16 bytes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

signatures

A

authentication of who sent the message

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

access control matrix

A

a detailed tables of subject to objects where the cells are the rights of the related subjects and objects by row and column

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

autorun virus

A

a virus that resides as an autorun program in a dick (ex: usb)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

mandatory access control

A

the system sets the rights

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

logic bomb

A

violates the site security policy when some external event occurs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

stealth virus

A

conceals infection of files undetected

changes data within the intercepted calls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

access control

A

the rules of what someone has access to

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

steganography

A

an attack that hides data in other data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

integrity

A

data is trustworthy and free from tampering (no change)

18
Q

public/private keys

A

used for encryption and decryption

19
Q

public key

A

encryption, available to anyone

20
Q

private key

A

decryption, known only to individual

21
Q

trojan horse

A

malware that tricks users of its true intent by disguising itself as a normal program

22
Q

RSA

A

uses math and large prime integers to drive the key, and uses exponential and modulus functions with the keys encode and decode the message

23
Q

distributional denial of service (DDoS)

A

the attacker floods a server with internet traffic to prevent users from accessing online services (affects availability)

24
Q

availability

A

viewable/access by people

25
clark wilson model
protects the integrity of commercial information by allowing only certified actions by explicitly authorized users on resources (contraints)
26
symmetric key
the encryption key and decryption key is the same
27
digital encryption system (DES)
block cypher, encryption, 56-bit key length, uses algorithms to scramble data into an unreadable format
28
polymorphic
encryption of data in multiple forms that are protected by multiple keys
29
transposition
reorder the message by choosing every nth character. n is both encryption and decryption key
30
Bell-LaPadula Model
used for confidentiality, read down, write down, policy method
31
block modes
for block cyphers, key generation used during the encryption for each single block
32
biba model
used for integrity, read up, write down, the higher the integrity level, the more trustworthy the source
33
firewall
allowing traffic from source to destination
34
collision
when 2 inputs produce the same (hash) output
35
confidentiality
data is kept secrete or private
36
policy
a set of rules that define the degree of protection required
37
Protocols
specification on implementing policy
38
practice
actions to implement protocol, making sure protocols are being followed
39
Rivest Cipher 4 (RC4)
stream cypher, generates a key stream of bytes (1-256) from an initial variable length key, key scheduling algorithm for each byte at a time
40
access control list
objects perspective
41
access control capability list
subjects perspective
42
substitution
modify the plain text by swapping each character with another character on the list