Revision lecture Flashcards

(17 cards)

1
Q

Man-in-the-Middle (MITM)

A

Intercepting and potentially altering communication between two parties

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

DoS/DDoS

A

Overwhelming a network or service with traffic to make it unavailable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Privilege Escalation

A

gaining higher access than intended

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Code Injection

A

inserting malicious code into legitimate
programs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Malware

A

Worms, viruses, trojans, bots, ransomware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Buffer Overflow

A

exploiting memory errors to gain control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Phishing

A

tricking users into revealing sensitive information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Where Problems Originate

A

Code, applications, configurations, networks, and users

All layers of the system can introduce vulnerabilities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is Social Engineering?

A

The use of psychological manipulation to trick individuals into
giving up confidential information or access.

Focuses on exploiting human behavior rather than technical
flaws

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Phishing

A

fake emails/websites to steal credentials

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Pretexting

A

creating a fabricated scenario to obtain data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Baiting

A

offering something enticing to get victims to ac

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Quid Pro Quo

A

offering a service in exchange for information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Tailgating

A

following someone into a secure area

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Why Do People Fall for Social Engineering?

A

Greed – offers that are too good to be true

Impersonation – attackers pretending to be someone trusted

Authority – false claims of power or position

Urgency – pressure to act quickly, reducing critical thinking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Programming Flaws that Lead to Security Issues

A

Code Injection: Attacker injects malicious code that is
executed by the application

Uninitialized Variables: Can take on unsafe default values,
causing unintended behavior

Stack Vulnerabilities: The stack stores local variables and
the return address