security learning Flashcards
(94 cards)
What is a form of spam through IM, PM, DM.
Spimming
443-TCP
Hyper Text Transfer Protocol Secure, Transmit web page data to a client over an ssl tls encrypted connection.
Collision Resistance
Property of a hash function that is computationally infeasible to find two colliding inputs.
161-UDP
Simple Network Management Protocol, remotely monitor network devices.
119-TCP
Network News Transfer Protocol Transport articles
On path attack, Man in the middle
Intercepts data
PKI
Public Key Infastructure, Set of hardware, software, policies, processes, and procedures required to create, manage, distribute, use, store, revoke digital certs and keys.
VPC
Victual Private Cloud, Private cloud in a public cloud
143-TCP
IMAP, Internet Message Access Protocol, Receive email from mail server with more functions than pop3
Deguassing
Expose hard drive to magnetic field which wipes the drive
Purging
Removes data and it cannot be reconstructed
Clearing
removal of data with assurance that it cannot be reconstructed
69-UDP
Trivial FTP, Simplified version of ftp to put a file on a remote host or get a file from host.
Nessus
Vulnerability check
NDA
Non Disclosure Agreement, Ensure sensitive data will not be disclosed to 3rd parties.
ISA
Interconnection Security Agreement, Defines how to secure communication
MOU
memorandum of understanding, general terms of agreement
MOA
Memorandum of agreement, defines granual contract details
Qualitative risk assessment
Organizes risks by severity or threat rating which may differ from one organization to another
APT
Advanced persistent threat, undetected for a long time steals data
Bluejacking
Sending unsolicited content to someone over Bluetooth
Blue Snarfing
Access to device data vie bluetooth
Jump Box
System on a network used to access and manage devices in a separate security zone
SQL Injection
Code injection that might destroy database. Placement of malicious code in SQL statements.