CSEC EXAM VOCAB

0.0(0)
studied byStudied by 0 people
full-widthCall with Kai
GameKnowt Play
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/19

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

20 Terms

1
New cards

“Sensitive” Information

Any information that, if accessed by unauthorized personnel, could damage your organization in any way.

2
New cards

White Hat Hacker

A person who attempts to hack systems in order to find vulnerabilities and make recommendations for improvement, also known as an "ethical hacker."

3
New cards

Session Hijacking

The technique of intercepting the traffic between a server and a client in order to impersonate the client or otherwise gain unauthorized access or information:

4
New cards

 Intrusion Detection System (IDS) (or Intrusion Prevention System (IPS))

A system that monitors traffic on a network and helps identify threats and breaches by looking for abnormalities or known threats:

5
New cards

Internet of Things (IoT)

Refers to devices such as a car, refrigerator, HVAC system, microwave, etc, that are connected to the internet:

6
New cards

Netstat

A utility that provides a list of all the connections a computer currently has. AKA Network Status:

7
New cards

Signal Bits

Single bit flags that are turned on to indicate some type of communication

8
New cards

Switch

A device that connects computers together, but when it receives messages from a computer can send the message to the appropriate connected computer rather than broadcasting the message to all computers on the network:

9
New cards

IPconfig

A utility that provides information about a machine's network configuration including IP address and IP address of any gateway connecting it to the outside world:

10
New cards

(Internet) Backbones

The main transmission lines that run across the world connecting networks:

11
New cards

Multicloud

The practice of employing several cloud vendors in order to make use of the specific services each provider offers:

12
New cards

IPv4

A protocol for identifying particular nodes on the Internet that uses four bytes to identify the address:

13
New cards

Auction Fraud

Defrauding people through the interaction on an online auction

14
New cards

Personally Identifiable Information (PII)

Information that can be used to pick out an individual from others, such as name, address, phone number, SSN, DL number, etc:

15
New cards

SYN Cookies

This method of dealing with SYN floods sends a hash of the client's request information (IP address, port information, etc.) along with the SYN/ACK message, and doesn't allocate resources until after the ACK has been received along with that information, which is then verified:

16
New cards

IPS

A process often used by ISPs to protect networks by examining traffic in order to determine whether or not it is part of a DoS attack, and blocking all suspect messages:

17
New cards

DDoS

An attack involving a flood of requests where the aim is not so much to bring down the server, but merely to slow its service and render it inconvenient:

18
New cards

Polymorphic Virus

A virus that is similar to another type, but has been changed in some way:

19
New cards

Land Attack

An attempt to confound (and thus crash) the target by sending a packet with the target's IP as both source and destination. (Most modern computers are immune to this.):

20
New cards

HTML

Code that is portable to all operating systems or platforms because it is used to operate web pages and is often transmitted through websites wherein it is embedded: