CSCI 224 Week 2 quiz

0.0(0)
studied byStudied by 1 person
GameKnowt Play
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/33

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

34 Terms

1
New cards

Vulnerability

Weakness in a system or entity that can be exploited.

2
New cards

Asset

Something of value.

3
New cards

Security

Protection of an asset

4
New cards

Script

A set of instructions executed by a program or interpreter.

5
New cards

4 Categories of harm

  1. Interception.

  2. Interruption.

  3. Modification.

  4. Fabrication.

6
New cards

Threat

Circumstance that might cause harm.

7
New cards

C.I.A

Confidentiality, Integrity, and Availability.

8
New cards

Attack Vector

Specific method or path that is vulnerable.

9
New cards

Moore’s law

The number of Transistors in an integrated circuit double about every two years.

10
New cards

Transalantic Cable

International communication cables on the bottom of the ocean.

11
New cards

Cache

Very fast memory usually in CPU

12
New cards

Application

Software that performs automated functions for an user.

13
New cards

Virtualization

Allows a computer to emulate different operating systems.

14
New cards

Operating system

Program that manages all the basic functions and programs on a computer.

15
New cards

Browser

A client software program that can retrieve and display information from servers on the world wide web.

16
New cards

Server

A computer that delivers items like web pages, documents, or videos over a network, typically having no keyboard or screen.

17
New cards

PC (Personal Computer Desktop PC)

Typically used by a few people in a home or office, includes a keyboard and screen and runs various applications,

18
New cards

Laptop (Portable PC)

Smaller/lighter than a desktop PC using less electrical power, and operable from battery power

19
New cards

Tablet

Portable computer typically the size of a book with the size being mostly the screen which is used for both input and output.

20
New cards

HTTPS

When used in the first part of an URL, this term specifies the use of hypertext transfer protocol

21
New cards

Protocol

Common language used in communication of computer systems

22
New cards

Context switching

When CPU swaps programs in and out of hard drive.

23
New cards

RAM

Stores Running programs.

24
New cards

Hard Drive

Holds resident Programs.

25
New cards

Port

Allow connection w/ outside networks.

26
New cards

Control Measure

How to control and to mitigate an attack.

27
New cards

Hardware Vs. Software

The physical parts of a computer Vs. The programs

28
New cards

Interception

Data or processing in motion is redirected or skimmed

29
New cards

Interruption

Data or processing is stopped

30
New cards

Modification

Data is modified at rest of motion

31
New cards

Fabrication

Data is adding complete false information

32
New cards

CPU

Central Processing Unit

33
New cards

Guest Machine

A VM running on a host machine

34
New cards

Host Machine

The machine uses the by a hypervisor to create a guest machine