Vocab Flashcards

(45 cards)

1
Q

Tokenization

A

Process of turning a meaningful piece of data into a token that has no meaningful value if breached

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Iaas (Infrastructure as a service)

A

Cloud computing that provides virtualized resources over the internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

PaaS (Platform as a service)

A

Third party provider delivers hardware and software tools over the internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

SaaS (Software as a service)

A

Cloud provider hosts applications and makes them available over the internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Thin Client

A

A computer that runs from resources stored on a central server instead of a hard drive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Elasticity

A

Ability of an IT infrastructure to respond without jeopardizing availability, security, and performance.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Scalability

A

Ability of a process, network, or software to grow and manage demand

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Key Strectching

A

Converting a password to a longer and more random key for cryptographic purposes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Elliptic-Curve Cryptography

A

Public key encryption technique that creates faster, smaller, and more efficient keys

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Perfect Forward Secrcey

A

Encryption system that changes the keys to encrypt and decrypt frequently and automatically

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

DNNSSEC (Domain name system security extension)

A

Defend against techniques hackers use to direct computers to rogue websites and servers using SSH

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

S/MIME (Secure multipurpose internet mail extension)

A

Sending digitally signed and encrypted messages

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

SRTP (secure real-time protocol)

A

Uses encryption and authentication to minimize risk of DOS attacks and breaches

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

LADPS (lightweight directory access protocol over SSL)

A

Authenticate users from windows server and active directory over SSL

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

FTPS (File transfer protocol secure)

A

Secure file transfer protocol that allows businesses to connect securely with customers, users etc using TLS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

SFTP (Secure file transfer protocol over SSH)

A

Secure file transfer protocol that runs over the SSH protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

SNMPv3 (simple network management protocol v3)

A

Provides security with authentication and privacy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

IPSec (internet protocol security)

A

Suit of protocols developed to ensure integrity, confidentiality, and authentication of data over the IP network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

SQL (structured query language)

A

Standard database language which is used to create, maintain and retrieve the relational database

20
Q

Directory Traversal

A

Web security vulnerability that allows an attacker to read arbitrary files on the server that is running an application

21
Q

Memory Leak

A

A program you run, fails to release memory that it has used

22
Q

Integer Overflow

A

An arrhythmic error when the result of an integer operation does not fit within the allocated memory

23
Q

Error Handling

A

Response and recovery procedures from error conditions present in a software application

24
Q

Improper Input Handling

A

Term used to describe functions such as validation, sanitization, filter erroring, encoding and decoding of data

25
DLL (dynamic link library)
A library that can be shared by several applications running under windows
26
LDAP (lightweight directory access protocol)
Software protocol for enabling anyone to locate data about organizations, individuals, and other resources
27
XML (Extensive markup language)
Designed to store and transport data and designed to be readable by humans and machines
28
Buffer Overflow
Writing data to a buffer, overruns the buffers boundaries and overwrites adjacent memory locations
29
Replay Attack
Network attack which a valid data transmission is maliciously or fraudulently repeated or delayed
30
Pass the hash
Attacker captures a password hash and the passes it through for authentication and lateral movement
31
Evil Twin
Fake wifi network that steals data
32
Rogue Access point
Wireless access point that has been installed on a network
33
Bluesnarfing
Hacking a device using bluetooth
34
Bluejacking
Sending anonymous messages to Bluetooth devices
35
ARP Poisoning (address resolution protocol poisoning)
Attack carried out over the LAN that sends ARP packets to a default gateway in order to change the IP to MAC address table
36
MAC Flooding
Compromising the security of switches
37
DNS Highjacking
Changing the registration of a domain name without permission
38
DNS Poisoning
Altered DNS records are used to redirect online traffic to a fraudulent website that resembles the intended target
39
False-Positive
Mislabeled security alters, indicating there is a threat when there isn't
40
False-Negatives
A security system fails to identify a threat. Produces a negative result when there is a problem.
41
OSINT (open-source intelligence)
Framework focused on gathering information from free tools and resources
42
Masking
Method of creating structurally similar but inauthentic version of an organizations data
43
Data at rest
Data that is not actively moving from device to device or network to network such as data stored don a hard drive, laptop, floppy disks etc
44
Data in motion/transit
Digital information that is in the process of being transported between location either within or between computer systems
45
Data in processing
Conversion of raw data to meaningful information through a process