This class was created by Brainscape user Seamus Bonner. Visit their profile to learn more about the creator.

Decks in this class (19)

Introduction
What is the aim of cyber security,
How are computers protected from ...,
What are the five functions of se...
28  cards
Cryptography
When is a message m vulnerable in...,
What is encryption,
What is decryption
41  cards
Hashing
What is a hash function,
Why is this one way mapping useful,
What are the properties required ...
9  cards
Digital Signatures and PKI
What is a digital signature,
Who verifies a digital signature,
What properties must digital cert...
25  cards
Vulnerabilities
What is a threat,
What is an exploit,
What is malware
26  cards
Password Authentication
What are the two standard securit...,
What is an entity,
What do we need to determine abou...
24  cards
Multi-Level Authentication
What is multi level authentication,
What are the different methods of...,
What are the drawbacks of visual ...
15  cards
Biometrics
What are biometrics,
What are the issues with biometrics,
Where are biometrics usually used
19  cards
Access Control
What is access control,
What are the forms of access control,
What does access to a system mean
45  cards
Security Models
What is a policy,
How does a reference monitor fit ...,
What does the security kernel do ...
30  cards
Secure Communications and Application Vulnerabilities
How are secure communications ach...,
What is the layered model of netw...,
Where are security protocols impl...
38  cards
Steganography
What is steganography,
What mediums can be used for steg...,
How are images constructed
12  cards
Needham-Shroeder & Kerberos
How does needham schroeder work,
What are nonces used for,
What are the limitations of using...
20  cards
IPSec
What protocol was tls based on,
What algorithms does tls use for ...,
How is authentication done in tls
57  cards
Network Defence
What is a firewall,
What can firewalls do,
How are decisions made on where t...
46  cards
Intelligent Intrusion Detection Systems
What are the types of ids,
How does host based ids work,
How does network based ids work
31  cards
WiFi and Cloud Security
What is wpa,
What did wpa have a problem with,
What was developed to strengthen wpa
30  cards
Privacy and Social Networks
What is privacy,
What is the right to be forgotten,
How can individiauls stay private...
18  cards
Risk Assessment
What are the three processes of risk,
How is risk calculated,
What are the four categorisations...
8  cards

More about
cs4203: computer security

  • Class purpose General learning

Learn faster with Brainscape on your web, iPhone, or Android device. Study Seamus Bonner's CS4203: Computer Security flashcards for their University of St Andrews class now!

How studying works.

Brainscape's adaptive web mobile flashcards system will drill you on your weaknesses, using a pattern guaranteed to help you learn more in less time.

Add your own flashcards.

Either request "Edit" access from the author, or make a copy of the class to edit as your own. And you can always create a totally new class of your own too!

What's Brainscape anyway?

Brainscape is a digital flashcards platform where you can find, create, share, and study any subject on the planet.

We use an adaptive study algorithm that is proven to help you learn faster and remember longer....

Looking for something else?

CS407 Computer Security
  • 4 decks
  • 251 flashcards
  • 2 learners
Decks: Week 6 Network Secuty Defence, Week 7 Web Security And Malware, Week 8 Human Aspects Of Computer Securit, And more!
Security+ Exam
  • 34 decks
  • 787 flashcards
  • 3 learners
Decks: Section 1 Overview To Security, Section 2 Malware, Section 3 Malware Infections, And more!
GCSE Computer Science (OCR)
  • 15 decks
  • 1702 flashcards
  • 1620 learners
Decks: Definitions, 11 Systems Architecture, 12 Memory Complete, And more!
Make Flashcards