Study Guide Flashcards
(170 cards)
What are the three main goals of an operating system?
- Efficiently manage hardware resources (maximize performance and resource usage)
- Provide user-friendly interaction (make using the system easy and convenient)
- Hide hardware complexity (offer abstraction so users/programs don’t deal with low-level details)
What kind of key does symmetric cryptography use for encryption and decryption?
Same key — Private for both
Which algorithm is used in symmetric cryptography?
DES
What kind of keys are used in asymmetric cryptography?
Encrypt with the public key, decrypt with the private key
Which algorithm is used in asymmetric cryptography?
RSA
What is a man-in-the-middle attack?
When someone secretly intercepts and possibly changes the conversation between two people — pretending to be one of them to steal info.
What is a logic bomb?
Hidden code that waits until certain conditions are met, then it triggers and causes damage.
What is a backdoor?
A secret way to get back into a system — often left by attackers after a hack so they can sneak in again.
What is session hijacking?
When someone takes over your active session and pretends to be you — without needing your password.
What is social engineering?
Tricking or manipulating people into giving up info — like phishing, fake support calls, or pretending to be someone you trust.
What’s the difference between breach of confidentiality and integrity?
Confidentiality: Someone sees private data they shouldn’t.
Integrity: Someone changes data they shouldn’t.
What is a denial-of-service (DoS) attack?
Flooding a site or system with traffic so it crashes or becomes unusable.
Ransomware vs Spyware?
Ransomware: Locks your files and demands money.
Spyware: Secretly collects your private info.
Boot virus vs Rootkit?
Boot virus: Hits during startup.
Rootkit: Hides in the system to avoid detection and give control to hackers.
Virus vs Worm?
Virus: Needs user action to spread.
Worm: Spreads itself across networks without help.
What is a Trojan horse?
Fake legit-looking software that hides malware — seems safe but it’s not.
What is a code-injection attack?
Hacker inserts malicious code into a program input (like a login form) to trick the system — ex: SQL injection.
Why use a sandbox?
To test code or software in a safe, isolated space that can’t mess up the real system.
What is a hash?
A unique fingerprint of data — used to check if anything has been changed.
What is a DDoS attack?
A bunch of systems flood a target all at once to take it down — like DoS but way more intense.
What does “defense in depth” mean?
Having multiple layers of protection — if one fails, others still keep things safe.
What is two-factor authentication (2FA)?
You need two of these to log in:
Something you know (password)
Something you have (phone)
Something you are (fingerprint)
What is a Message-Authentication Code (MAC)?
A Message-Authentication Code (MAC) is a security tag added to a message to ensure both data integrity and authenticity.
It is generated using a shared secret key and a cryptographic algorithm. The receiver uses the same key to verify that the message has not been altered and that it came from a trusted source.
What is a stream cipher?
A stream cipher encrypts data one bit or byte at a time, often in real-time as the data is transmitted.
It’s typically used for live communication, like voice or video calls.
Example: RC4