Sec+ Book Flashcards
Cross Site Scripting (XXS)
Attackers embed malicious html or java code into website to capture cookies or hased passwords
Cross Site Request Forgery
attacker tricks user into preforming an action on a website that creates a html link
Code Signing
provides digital signature for code +certification includes hash for code
Static Code Analysis
examines code without running it
Dynamic Code Analysis
examines code while running
Sanboxing
isolated area used for testing
Domain Hijacking
attacker changes registration of domain name without permissions from the owner, usually social engineering
Shimming
produces solution that makes it appear that older drivers are compatible
Refractoring
Rewriting code without changing behavior
Memory Leak
a bug in the app that consumes more memory as it runs
Integer overflow attack
attempts to create numeric value that is too big for an application to handle
Buffer Overflow
when an app recieves more input or different input then expected
Diffie Hellman
algorithm used to private share key between two paroes
MD5
Message Digest - Produces 128 bit hash shown in hexadecimal
SHA
Secure Hash Algorithm - Verifies integrity
Diffusion
Small changes in plain text result in large changes in cipher
Block Cipher
encrypts data in specific sized blocks of 8
Twofish
Blowfish
RC5
CFB
Stream Cipher
encyrpts data as a stream of bits rather than blocks and is more efficent
RC4
TLS
AES
Online Certificate Status Protocol (OCSP)
allows the client to query the ca with serial number of the certificate
Transport Layer Security (TLS)
encrypts https traffic, replacement for SSL,port 443 (TLS)
Secure Sockets Layer (SSL)
certificate based authentication + encrypts data with a combinations of both symmetric and asymmetric
Pretty good Privacy (PGP)
Encrypts email traffic with RSA
CA
Certificate Authority
CRL
certificate revocation list, CA Revoked