1/33
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
Vulnerability
Weakness in a system or entity that can be exploited.
Asset
Something of value.
Security
Protection of an asset
Script
A set of instructions executed by a program or interpreter.
4 Categories of harm
Interception.
Interruption.
Modification.
Fabrication.
Threat
Circumstance that might cause harm.
C.I.A
Confidentiality, Integrity, and Availability.
Attack Vector
Specific method or path that is vulnerable.
Moore’s law
The number of Transistors in an integrated circuit double about every two years.
Transalantic Cable
International communication cables on the bottom of the ocean.
Cache
Very fast memory usually in CPU
Application
Software that performs automated functions for an user.
Virtualization
Allows a computer to emulate different operating systems.
Operating system
Program that manages all the basic functions and programs on a computer.
Browser
A client software program that can retrieve and display information from servers on the world wide web.
Server
A computer that delivers items like web pages, documents, or videos over a network, typically having no keyboard or screen.
PC (Personal Computer Desktop PC)
Typically used by a few people in a home or office, includes a keyboard and screen and runs various applications,
Laptop (Portable PC)
Smaller/lighter than a desktop PC using less electrical power, and operable from battery power
Tablet
Portable computer typically the size of a book with the size being mostly the screen which is used for both input and output.
HTTPS
When used in the first part of an URL, this term specifies the use of hypertext transfer protocol
Protocol
Common language used in communication of computer systems
Context switching
When CPU swaps programs in and out of hard drive.
RAM
Stores Running programs.
Hard Drive
Holds resident Programs.
Port
Allow connection w/ outside networks.
Control Measure
How to control and to mitigate an attack.
Hardware Vs. Software
The physical parts of a computer Vs. The programs
Interception
Data or processing in motion is redirected or skimmed
Interruption
Data or processing is stopped
Modification
Data is modified at rest of motion
Fabrication
Data is adding complete false information
CPU
Central Processing Unit
Guest Machine
A VM running on a host machine
Host Machine
The machine uses the by a hypervisor to create a guest machine