Vocab Flashcards

(57 cards)

1
Q

Zero day attack

A

An attack that is executed on a vulnerability in software before the vulnerability is known to the creator of the software.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

X.509

A

A common PKI standard developed by the ITU-T that incorporates the single sign on authentication method.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Worm

A

Code that runs on a computer without the user’s knowledge; a worm self replicates, whereas a virus does not.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Wiretapping

A

Tapping into a network cable in an attempt to eavesdrop on a conversation or steal data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Wired Equivalent Privacy (WEP)

A

A deprecated wireless network security standard, less secure than WPA.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Wi-Fi Protected Setup (WPS)

A

A simplified way of connecting to wireless networks using an eight-digit code. it is now deprecated due to its insecure nature and should be disabled if currently used.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Wi-Fi Protected Access (WPA)

A

A security protocol created by the Wi-Fi alliance to secure wireless computer networks; more secure than WEP.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

White hat

A

A type of hacker that is contracted to break into a system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

White-box testing

A

A method of testing applications or systems where the tester is given access to the internal workings of the system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Whaling

A

A phishing attack that targets senior executives.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Web security gateway

A

An intermediary that can scan for viruses and filter Internet content.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Web of trust

A

A decentralized model used for sharing certificates without the need for a centralized CA.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Watering hole attack

A

An attacker profiles which websites a user accesses and later infects those sites to redirect the user to other websites.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Warm site

A

A site that has computers, phones, and servers, but they may require configuration before users can start working on them.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

War-driving

A

The act of searching for wireless networks by a person in a vehicle through the use of a device with a wireless antenna, often a particularly strong antenna.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

War-dialing

A

The act of scanning telephone numbers by dialing them one at a time and adding them to a list, in an attempt to gain access to computer networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

War-chalking

A

The act of physically drawing symbols in public places that denote open, closed, or protected wireless networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Vulnerability scanning

A

The act of scanning for weaknesses and susceptibilities in the network and on individual systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Vulnerability management

A

The process of finding and mitigating software vulnerabilities in computers and networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Vulnerability assessment

A

Base lining of the network to assess the current security state of computers and networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Vulnerability

A

Weakness in your computer network to assess the current security state of comprises, servers, network devices, and the entire network in general.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

VPN Concentrator

A

A hardware appliance that allows hundreds of users to connect to the network from remote locations via a VPN.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

VLAN hopping

A

The act of gaining access to traffic on other VLANs that would not normally be accessible by jumping from one VLAN to another.

24
Q

Vishing

A

A type of phishing attack that makes use of telephones and VoIP

25
Virus
Code that runs on a computer without the user's knowledge; it infects the computer when the code is accessed and executed.
26
Virtualization
The creation of a virtual entity, as opposed to a true or actual entity.
27
Virtual Private Network (VPN)
A connection between two or more computers or devices that are not on the same private network.
28
Virtual Machine
Created by virtual software; VMs are images of operating systems or individual applications.
29
Vampire tap
A device used to add computers to a 20BASE5 network. It pierces the cooper conductor of a coaxial cable and can also be used for malicious purposes.
30
Zombie
Individual compromised computer in a botnet
31
User Account Control (UAC)
A security component of windows that keeps every user (besides the actual Administrator account) in standard user mode instead of as an administrator with full administrative rights--even if they are a member of the Administrators group
32
Uninterruptible Power Supply
Takes the functionality of a surge suppressor and combines that with a battery backup, protecting computers not only from surges and spikes, but also from sags, brown outs, and black outs.
33
UDP Flood Attack
A similar attack to Fraggle. It uses the connection less User Datagram Protocol. It is enticing to attackers because it does not require a synchronization process.
34
Typo squatting (URL hijacking)
A method used by attackers that takes advantages of typos when accessing websites. Instead of the expected website, a user ends up at a website with a similar name but often malicious content.
35
Trusted Operating System
A system that adheres to criteria for multilevel security and meets government regulations.
36
Trusted Computer System Evaluation Criteria (TCSEC)
A DoD standard that sees basic requirements for assessing the effectiveness of computer security access policies. Also known as the Orange Book.
37
Trojan Horse
An application that appears to perform desired functions but is actually running malicious functions behind the scenes
38
Triple DES (3DES)
Similar to DES but applies the cipher algorithm three times to each cipher block
39
Transport Layer Security
The successor to SSL. provides secure internet communications. This is shown in browser as https
40
Towers of Hanoi
A backup rotation scheme based on the mathematics of the towers of Hanoi puzzle. Uses three backup sets. For example, the first tape is used every second day, the second tape is used for every fourth day, and the third tape is used for every 8th day
41
Time of day restrictions
When users logon hours are configured to restrict access to the network during certain times of the day and week
42
Time bomb
A Trojan set off on a certain date
43
Tickets
Part of the authentication process used by Kerberos
44
Threat vector
The method a threat uses to gain access to a target computer.
45
Threat modeling
A way of prioritizing threats to an application.
46
Terminal Access Controller Access-Control System (TACACS)
A remote authentication protocol similar to RADIUS used more often in Unix networks
47
Temporal Key Integrity Protocol
An algorithm used to secure wireless computer networks; meant as a replacement for WEP
48
TEMPEST
Refers to the investigations of conducted emissions from electrical devices, which could be compromising to an organization.
49
Teardrop attack
A type of DoS that sends mangled IP fragments with overlapping sized payloads to the target machine
50
TCP/IP Hijacking
When a hacker takes over a TCP session between two computers without the need of a cookie or any other type of host access
51
TCP reset attack
Sets the reset flag in a TCP header to 1, telling the respective computer to kill the TCP session immediately
52
Tailgating
A type of piggybacking where an unauthorized person follows an authorized person into a secure area, without the authorized persons consent
53
Systems Development Life Cycle
The process of creating systems and applications, and the methodologies used to do so
54
SYN flood
A type of DoS where an attacker sends a large amount of SYN request packets to a server in an attempt to deny service
55
Symmetric key algorithm
A class of cipher that uses identical or closely related keys for encryption and decryption
56
Surge
Means there is an unexpected increase in the amount of voltage provided
57
Supervisory control and data acquisition (SCADA)
System of hardware and software controls and monitors industrial systems such as HVAC