Security: identifiying and preventing vulnerablilities Flashcards

1
Q

penetration testing

A

Legally hacking into a system to identify vulnerabilities, ‘White hat hacking’

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Anti-malware

A

Identifies and removes malware.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Firewalls

A

Controls access to a network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Passwords

A

needed to pass a login screen and access an account. Passwords should be as strong as possible (use a mix of letters, numbers and symbols. Don’t use words that are in the dictionary.) so that they are not easily guessed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Cypher

A

Encrypted - or ‘scrambled’ - data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Key

A

The unique ‘descrambler’ used to decrypt encrypted - or

‘scrambled’ - data. Basically instruction of how to reverse encryption.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

User Access Levels

A

Different users have access to different data. creates a ‘hierachy’ of sorts.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Encryption

A

‘Scrambling’ data to make it unable to read without decryption via the use of a key.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Two factor authentification

A

Use of more than just one system to identify that the correct user is trying to access a system. Often uses a password as well as a text sent to the user’s phone number with a unique one-time-use code.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly