CS Paper 3 26' Key Terms

0.0(0)
studied byStudied by 0 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/25

encourage image

There's no tags or description

Looks like no tags are added yet.

Last updated 5:30 AM on 2/6/26
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

26 Terms

1
New cards

Buffer overflow attacks

A buffer overflow attack happens when a program receives more data than it can store, causing extra data to overwrite nearby memory. Attackers can use this to run malicious code or take control of a system.

2
New cards

Cross-site scripting (XSS)

Cross-site scripting (XSS) is when attackers inject harmful code (usually JavaScript) into a website so it runs in other users' browsers. This can steal cookies, passwords, or session data.

3
New cards

Exploit development

Exploit development is the process of finding a weakness in software and creating code that takes advantage of it to gain access, run commands, or steal data.

4
New cards

Hacker

A hacker is someone who uses technical skills to access computer systems. Hackers can be malicious (breaking in illegally) or ethical (testing systems to improve security).

5
New cards

IP address

An IP address is a unique number that identifies a device on a network. It allows devices to send and receive data over the internet or a local network.

6
New cards

Malware

Malware is malicious software designed to harm systems, steal data, or give attackers control. Examples include viruses, ransomware, and spyware.

7
New cards

Network mapping

Network mapping uses scan results to create a structured list of devices, including IP addresses, operating systems, and services.

8
New cards

Network scanning

Network scanning is the process of checking a network to find active devices, open ports, services, and possible vulnerabilities.

9
New cards

Network topology

Network topology shows how devices are connected and how data flows between them, either physically or logically.

10
New cards

Open-source intelligence (OSINT)

OSINT is collecting information from public sources like websites, social media, and forums without hacking or breaking laws.

11
New cards

OS detection

OS detection identifies the operating system running on a device by analyzing how it responds to network probes.

12
New cards

Password cracking tool

A password cracking tool is a program that tries many password combinations to guess or recover passwords. Security professionals use them to test password strength.

13
New cards

Penetration testing

Penetration testing is an authorized, controlled cyberattack used to find security weaknesses before real attackers can exploit them.

14
New cards

Port scanning

Port scanning checks which ports on a device are open or closed to see what services are running and how exposed the system is.

15
New cards

Pretexting

Pretexting is creating a fake but believable story or identity to trick someone into giving confidential information.

16
New cards

Response plan

A response plan outlines how an organization detects, responds to, and recovers from a cyber incident.

17
New cards

Search engine dorking

Search engine dorking uses special search queries to find exposed files, login pages, or sensitive information indexed by search engines.

18
New cards

Security posture assessment

A security posture assessment evaluates how well an organization can defend against cyber threats, including policies, tools, and practices.

19
New cards

Social engineering attacks

Social engineering attacks manipulate people into revealing information or performing actions that weaken security, instead of attacking systems directly.

20
New cards

SQL injection

SQL injection is when attackers insert malicious SQL commands into a website's input fields to access, change, or delete database data.

21
New cards

System forensics

System forensics involves analyzing logs, files, and system activity to understand how an attack happened and what the attacker did.

22
New cards

Testing

Testing refers to systematically checking systems, networks, or applications to identify vulnerabilities and security risks.

23
New cards

Black box

Black box testing simulates an external attacker with no inside knowledge of the system.

24
New cards

Grey box

Grey box testing uses partial knowledge of the system, simulating an insider or attacker with limited access.

25
New cards

White box

White box testing gives testers full knowledge of the system, including code, configurations, and network diagrams.

26
New cards

Vishing (voice phishing)

Vishing is a social engineering attack where attackers use phone calls to pretend to be trusted people and steal sensitive information.

Explore top flashcards

YCJA study guide
Updated 242d ago
flashcards Flashcards (36)
Pulmonology E1: ABGs
Updated 429d ago
flashcards Flashcards (42)
4080 Midterm
Updated 1062d ago
flashcards Flashcards (62)
Health Science
Updated 1085d ago
flashcards Flashcards (48)
Spanish 3 Unit 2-2
Updated 1070d ago
flashcards Flashcards (74)
Unit 5: Hereditary
Updated 1040d ago
flashcards Flashcards (62)
YCJA study guide
Updated 242d ago
flashcards Flashcards (36)
Pulmonology E1: ABGs
Updated 429d ago
flashcards Flashcards (42)
4080 Midterm
Updated 1062d ago
flashcards Flashcards (62)
Health Science
Updated 1085d ago
flashcards Flashcards (48)
Spanish 3 Unit 2-2
Updated 1070d ago
flashcards Flashcards (74)
Unit 5: Hereditary
Updated 1040d ago
flashcards Flashcards (62)