Security Flashcards

1
Q

What is a program threat?

A

Malicious code like virus, worm, Trojan horse.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Define system threat.

A

Attack on system resources like DoS or port scanning.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is encryption?

A

Converting data into unreadable form for unauthorized users.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Symmetric vs Asymmetric encryption?

A

Symmetric: same key; Asymmetric: public/private keys.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Example of symmetric algorithm?

A

AES, DES.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Example of asymmetric algorithm?

A

RSA.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Levels of security measures?

A

Physical, human, OS/Network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Types of security violations?

A

Accidental or malicious data leaks, modification, destruction.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is a worm?

A

A standalone malware that replicates and spreads over networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is phishing?

A

A social engineering attack to steal sensitive data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Define authentication.

A

Verifying the identity of a user or process.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is hashing used for in security?

A

To verify data integrity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What does SSL/TLS do?

A

Secures communication over the internet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What does SSL stand for?

A

Secure Socket Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What does TLS stand for?

A

Transport Layer Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Why can absolute security never be achieved?

A

The cost for a perpetrator must simply be high enough to deter intruders.

17
Q

How strong is security?

A

It is only as strong as its weakest link.

18
Q

What is a Trojan Horse?

A

A malicious program pretending to be legitimate, which can block, modify, or delete data, but can’t duplicate like worms.

19
Q

What is a Trap Door?

A

A vulnerability left intentionally, such as hardcoded credentials, allowing unauthorized access.

20
Q

What is a Logic Bomb?

A

Code that activates under specific conditions, such as dates or times.

21
Q

What is Stack and Buffer Overflow?

A

A technique where arguments overwrite the stack’s return address, leading to malicious control.

22
Q

What are Viruses?

A

Code fragments embedded in programs that can duplicate and spread across networks.

23
Q

What are the categories of viruses?

A
  • File/Parasitic
  • Boot/Memory
  • Macro
  • Source Code
24
Q

What differentiates system/network threats from program threats?

A

System and network threats abuse services rather than exploiting program vulnerabilities.

25
What is denial-of-service (DoS)?
An attack that overloads a target to prevent it from functioning, e.g., infinite pop-up windows.
26
What was the Morris Internet Worm?
One of the first Internet worms (1988), exploiting UNIX vulnerabilities with a bootstrap program.
27
What is cryptography?
secret writing, using techniques like encryption, decryption, and cryptanalysis.
28
Why is cryptography necessary?
Networks are vulnerable to spoofing and eavesdropping, making sender/receiver identification unreliable. Cryptography ensures secure communication by eliminating dependence on untrusted networks.
29
What does cryptography enable?
Sender encrypts messages so only the intended recipient can decode them. Recipient verifies the sender using cryptographic keys.