security Flashcards

security

1
Q

access levels / level of access

A

Settings that determine who can access an item and what they can do with it (read, write, delete). Applies to files, folders and databases among other things.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

anti-virus

A

Software to detect and remove viruses and other malware.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

asymmetric key encryption

A

Encryption system in which two keys are used: a public key used only to encrypt data, and a private key used only to decrypt it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

authentication

A

Establishing a user’s identity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

backdoor

A

Method of bypassing security in a system, built in by the system designers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

biometric enrolment

A

Process of registering a user for a biometric system by taking an initial sample.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

biometric template

A

Measurements taken from a biometric sample.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

biometrics

A

Use of fingerprints, retina scans, or other body features as an authentication mechanism.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

botnet

A

Group of zombie computers under the control of a criminal.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

brute force attack

A

Attempt to break a password by trying all possible combinations of letters, numbers, and symbols.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

CAPTCHA

A

Scribble text displayed as an image, which the user must type in to verify that they are a person.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Certificate Authority

A

Organisation that issues digital certificates to individuals and companies.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

ciphertext

A

Result of encrypting plaintext.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Computer Misuse Act

A

UK law governing criminal offences committed using a computer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

cracking

A

Gaining illegal access to a computer system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

DDoS

A

Denial of service attack committed using dozens of computers, usually zombies on a botnet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

denial of service attack

A

Flooding a computer system with data so that it cannot respond to genuine users.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

dictionary attack

A

Attempt to break a password by trying all possible words.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

digital signatures

A

Technique used to authenticate remote users, such as online shopping businesses.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Distributed Denial of Service attack

A

Denial of service attack committed using dozens of computers, usually zombies on a botnet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

DNS poisoning

A

Technique used by criminals to alter DNS records and drive users to fake sites, to committing phishing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

DoS

A

Flooding a computer system with data so that it cannot respond to genuine users.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Drive-by download

A

Program which automatically downloads when a user visits a web page, usually without their knowledge or consent.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

encryption

A

System of encoding plaintext so that it cannot be understood with access to an encryption key.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

encryption key

A

Used to encrypt and decrypt data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

EV SSL

A

Extended Validation SSL. Digital certificate validation technique used on the world wide web.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

false negative

A

When a system incorrectly rejects an action instead of accepting it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

false positive

A

When a system incorrectly accepts an action instead of rejecting it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

full disk encryption

A

System that encrypts all data saved to a hard disk automatically and transparently.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

hacking

A

Gaining illegal access to a computer system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

home directory

A

Directory that contains a users personal files.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

https

A

Protocol used to send web pages securely over the Internet.

33
Q

identity theft

A

Stealing personal data in order to impersonate a person.

34
Q

key escrow

A

Idea of having encryption keys stored by a third party company so the government can access them if needed.

35
Q

key logger

A

Software or hardware which records all key strokes on a computer system.

36
Q

key pair

A

A public key and private key that work together in a public encryption system.

37
Q

macro virus

A

Virus that takes advantage of the macro programming languages built into some software.

38
Q

malware

A

Generic name for malicious software

39
Q

Multi-factor authentication

A

Use of several authentication techniques together, such as passwords and security tokens.

40
Q

one time password

A

Password generated by a security token, which expires as soon as it is used.

41
Q

packet sniffer

A

Software or hardware used to collect data travelling over a network.

42
Q

passphrase

A

Word or phrase used to authenticate a user.

43
Q

password

A

Word or phrase used to authenticate a user.

44
Q

pharming

A

Technique used by criminals to alter DNS records and drive users to fake sites, to committing phishing.

45
Q

phishing

A

Use of fake emails and web sites to trick users into revealing sensitive data.

46
Q

physical security

A

Locks, alarms, and other techniques used to securely a building or computer room.

47
Q

plaintext

A

Message before it is encrypted, or after it has been decrypted.

48
Q

private key

A

Key used for decryption in a public key encryption system.

49
Q

public key

A

Key used for encryption in a public key encryption system.

50
Q

public key encryption

A

Encryption system in which two keys are used: a public key used only to encrypt data, and a private key used only to decrypt it.

51
Q

root user

A

User with full control over a computer system.

52
Q

rootkit

A

Type of malware which infiltrates the operating system and attempts to hide itself from view.

53
Q

secret key encryption

A

Encryption system in which a single key is used for both encryption and decryption.

54
Q

Secure Socket Layer

A

System used to encrypt https web traffic.

55
Q

security token

A

Hardware device that must be present during login to authenticate a user.

56
Q

security update

A

Software update to fix a security problem discovered in software.

57
Q

smishing

A

Phishing attacks committed using text messages (SMS).

58
Q

social engineering

A

Tricking a user into revealing their password or other sensitive data.

59
Q

spam

A

Unwanted, bulk email.

60
Q

spam bot

A

Program that scans web pages for email address, in order to send spam.

61
Q

spam filters

A

Program designed to identify and block spam messages while letting genuine messages through.

62
Q

spyware

A

Malware which covertly records a user’s actions, such as their key presses.

63
Q

SSL

A

System used to encrypt https web traffic.

64
Q

symmetric key encryption

A

Encryption system in which a single key is used for both encryption and decryption.

65
Q

system administrator

A

Personal in overall charge of a computer system in an organisation.

66
Q

TLS

A

System used to encrypt https web traffic.

67
Q

Transport Layer Security

A

System used to encrypt https web traffic.

68
Q

trojan horse

A

Malware which pretends to be a genuinely useful program to trick the user into using it.

69
Q

unauthorised access

A

Gaining illegal access to a computer system

70
Q

Virus

A

Computer program which damages files and data spreads when infected programs are copied.

71
Q

virus definition file

A

Used by anti-virus programs to recognise known viruses.

72
Q

vishing

A

Phishing attacks committed using telephone calls or VoIP systems.

73
Q

vulnerability scanner

A

Software to scan a system for potential security problems.

74
Q

web bug

A

Technique used by spammers to detect if an email address is valid or not.

75
Q

WEP

A

Wired Equivalence Protocol. Wireless network encryption system.

76
Q

worm

A

Malicious software which replicates itself and spreads between computer systems and over networks.

77
Q

WPA

A

Wireless Protected Access. Wireless network encryption system.

78
Q

WPA2

A

Wireless Protected Access 2. Wireless network encryption system.

79
Q

zombie

A

Computer which has been compromised by malware and is part of a botnet.