Decks in this Class (23):
-
P1l1 Security Mindset
P1L1: Security Mindset
Sample Cards:what is of value that you are trying to,what are the 2 kinds of companies,what threat sources are there to worry a41 CardsPreview Flashcards -
P1l2 Software Security
P1L2: Software Security
Sample Cards:what are stack buffer overflows,the stack buffer is used for,what is shellcode36 CardsPreview Flashcards -
P1l3 Operating Systems
P1L3: Operating Systems
Sample Cards:what does an operating system do what do,what is a trusted computing base tcb,what are tcb requirements39 CardsPreview Flashcards -
P1l4 Authentication
P1L4: Authentication
Sample Cards:what is authentication,what is authorization,authentication goals50 CardsPreview Flashcards -
P1l5 Access Control
P1L5: Access Control
Sample Cards:two parts to access control,access control matrix acm,discretionary access control34 CardsPreview Flashcards -
P1l6 Mandatory Access Control
P1L6: Mandatory Access Control
Sample Cards:mandatory access control mac,what is needed to implement mac,labels also have a _______11 CardsPreview Flashcards -
P1l7 Database Security
P1L7: Database Security
Sample Cards:importance of db security,who are the biggest threats to db,databases are attractive to users becaus16 CardsPreview Flashcards -
P2l1 Malicious Software
P2L1: Malicious Software
Sample Cards:types of malware needs a host,types of malware independent,trap doors or back doors21 CardsPreview Flashcards -
P2l2 Modern Malware
P2L2: Modern Malware
Sample Cards:t f modern malware is for fun and games,botnet,examples of attacks frauds by botnets21 CardsPreview Flashcards -
All Quizzes For Test 1
All Quizzes For Test 1
Sample Cards:security mechanisms typically do not inv,the first step in devising security serv,to exploit any type of buffer overflow t73 CardsPreview Flashcards -
Book Ch 1 3 4 5
BOOK: Ch 1, 3, 4 & 5
Sample Cards:takes place when one entity pretends to,limit information system access to autho,means that every access must be checked27 CardsPreview Flashcards -
Book Ch 6 7 10
BOOK: Ch 6, 7, 10
Sample Cards:malware propagation mechanisms include t,______ include system corruption bots ph,virus dormant phase23 CardsPreview Flashcards -
Book Ch 11 12
BOOK: Ch 11, 12
Sample Cards:the process of designing and implementin,this problem occurs when program input d,when the input is used in theconstructio10 CardsPreview Flashcards -
Extra Questions For Test 1 Prep
Extra Questions for Test 1 Prep
Sample Cards:a bot is a computer compromised by malwa,the best defense against being an unwitt,botnet command and control must be centr10 CardsPreview Flashcards -
Test 1 Final Prep
Test 1 - Final Prep
Sample Cards:defensive or secure programming,injection attack,command injection168 CardsPreview Flashcards -
P2l5 Intro To Cryptography
P2L5: Intro To Cryptography
Sample Cards:what is ciphertext,what other services does encryption decr,most protocols use symmetric ciphers and20 CardsPreview Flashcards -
P2l6 Symmetric Encryption
P2L6: Symmetric Encryption
Sample Cards:what does confusion mean regarding encry,what is diffusion in encryption,what are rounds in ciphertext encryption14 CardsPreview Flashcards -
P2l55 Modular Arithmetic
P2L5.5: Modular Arithmetic
Sample Cards:what is the formula for moding a negativ,what is 6 mod 18,what is 17 mod 711 CardsPreview Flashcards -
P2l7 Public Key Cryptography
P2L7: Public Key Cryptography
Sample Cards:symmetric encryption is also referred to,the ciphertext only attack is the easies,a brute force approach involves trying e47 CardsPreview Flashcards -
P2l8 Hashes
P2L8: Hashes
Sample Cards:what are characteristics of a hash funct,what is the pigeonhole principle,what is the birthday paradox12 CardsPreview Flashcards -
P2l9 Security Protocols
P2L9: Security Protocols
Sample Cards:what are the building blocks for securit,what are key things to look out for in m,authentication can be one way t f9 CardsPreview Flashcards -
P2l10 Ipsec And Tls
P2L10: IPSec and TLS
Sample Cards:what are the goals of ip security ipsec,what two modes are in ipsec,what are the 3 parts to ipsec architectu12 CardsPreview Flashcards -
P2l12 Web Security
P2L12: Web Security
Sample Cards:what are cookies used for,what threats do cookies have,what is cross site scripting10 CardsPreview Flashcards
Current Learners (190)
-
Annie Ashfield 1721 cards viewed
-
Tony Mack 957 cards viewed
-
Akanksha P See full stats
-
Ryan Connor See full stats
-
Jason Yohanan See full stats
-
Proelq Angresh See full stats
-
cash miss See full stats
-
Michael Mroczka See full stats
-
savi prad See full stats
-
Mike Anderson See full stats
Popular Related Classes Brainscape Certified - ( See All )
midterm additional - cs6035
4 Decks -
70 Cards -
26 Learners
Decks: Chapters 1 3 4 5, Chapters 6 7 10, Chapters 11 12, And more!
CompTia Sec+ 501
5 Decks -
311 Cards -
66 Learners
Decks: Practice Exam 1, Practice Exam 2, Practice Exam 3, And more!