1/72
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
What is the OSI model?
Open System Interconnection model that uses 7 layers to communicate over a network
Unicast
a message that is sent from a single sender to a single recipient
Multicast
A message sent from one sender to multiple recipients
Broadcast
One sender to all recipients
What does DNS stand for?
Domain Name System
What's does the dns do
The internet's phone book- it maps the domain name to the ip address, ie- if I query bbc for me . Com the dns sends the ip of bbc for me .com and send the computer to the ip.
What is a firewall
Software and/or hardware that can block incoming or outgoing traffic from the internet to your computer- it secures a network
3 types of firewalls?
Packet-filtering- analyzes incoming packets and if they match a establish rule set are let in
Proxy- filter traffic on the application level
Stateful multilayer inspection smli- they filter packets at the network transport and application layers the packets are compared to trustworthy packets.
What is a vpn
Virtual Private Network- a secure tunnel from the client to the vpn server
What is distributed processing?
Multiple computers share the same processer
What are some advantages of distributed processing?
Reliable- multiple systems lower cost- cheaper than buying one big mainframe- easy to expand- and can better recover lost data.
What is the TCP/IP?
Transmission Control Protocol- a set of communication protocols that are used to interconnect network devices on the internet/Internet Protocol-gets packets to their destinations- tcpip is a compressed version of the osi model
What are the 4 layers of the tcp/ip
Network-internet-transport- application from bottom to top
What are the Sven layers of the osi model
Physical link- data link- network- transport-session- presentation- application layer
What is domain
Centralized network model- one administer manages the domain and its resources- good for large network-the computer can be connected to any network
What is workgroup
Decentralized network-each user individually manages their own computer- good for small network- all computer should connect to the same LAN- local area network
What is data encapsulation?
The procedure of adding headers and trailer to data. The headers and trailers add the source and destination address
What are 8 steps to keep a computer secure
2 way authentication- secure passwords- regular updates-antivirus-firewall-no phishing-cryptography(scrambling data ie conputer = qeidbworb)- securing dns
3 languages used in cybersecurity
Java-c- and c++
What is the most secure language
Java
What are the Seven most common sources of malware
Pop ups- removable media(usb)- documents and executable files .rar . Exe- internet downloads- network connections public Wi-Fi-email attachments- and malicious advertisements
Threats a company can face to their security
Natural- tornado fire etc-man made-theft or hacker-thechnical- software bugs or server fail-supply system- electricity or a short circuit
What is black box testing what is white box testing
White box- the ethical hacker is told everything about the system before probing for weaknesses- black box- 0 Knowles's of system before trying to find a weakness
What is use case testing
A black box test testing what users will do
Static testing
Done early in dev life cycle-includes walk through and code review-is 100% accurate in a short time-static testing is about prevention
Dynamic testing
Done with the finished product-includes functional and non functional testing- takes more time-it us about cure
What are the test levels in software testing
Module- checking sub programs- integration testing- testing larger parts of the program- system testing - test the whole system-acceptance testing-test by a quality insurance team to meet client requirements.
3 steps to resolve issues while testing
Record-report issues- and control-define teh issue management process
What is virtual memory
a portion of the hard disk designated to function as additional RAM
What are the six scheduling algorithms (for program priority)
First come first serve -fcfs-shortest job first-priority scheduling- a schedule person chooses schedule- multipem level ques-shortest remaining time-round robin- all get equal time
5 steps involved inhacking a network or server
1 reconnaissance the hacker finds out information
2 scanning- use reconnaissance information to use programs to gain more in depth knowledge
3 gain access/ attack in this phase the hacker gains access and jacks the target
4 maintain access- sometimes the hacker will ensure they have a way back into the system
5 cover tracks teh hacker will do anything to minimize their digital footprint
Name 6 sniffing tools
Wire shark tcp dump msn sniffer 2 ettercap dsniff ether ape
What is an os
An operating system is a software program that is an intermediary between computer program and hardware it is needed for the computer to actually work provides a platform of communication between hardware and teh software
What are the 5 different types of os's
1 batched is
2 distributed
3time sharing
4multi-programmed
5real time
What does zombie mean in Linux
The process is terminated but the process table still holds information
What does SQL stand for?
Structured Query Language
What is an SQL injection?
Where an attacker injects malicious input into an sql. Statement.
What is an sql statement
A set of instructions
What is spoofing
Spoofing is where the attacker pretends to be a different person of organization and sends a legitimate looking email
What is a DDoS attack?
A ddos attack is an attack used to restrict user access by flooding the traffic that is used to access resources
What is a bot
a program that performs a repetitive task
What is a botnet
A network of bots in a DDoS attack.
How is a ddos attack carried out
The attacker uses a botnet to flood traffic in the servers of a specific resource and neuters the ability for users to access the resource
What is ransomware?
A form of malware the blocks the access of a user to their own data until paid a certain sum of money
What are the 3 type of ransoms ware
Scareware - a form of malware that uses social engineering or the perception of a threat to scare the user into buying something
Screen lockers- locking a computers login screen and showing an official looking message
Encrypting random ware- the random ware displays a message asking for money to receive the asymmetric key needed to decrypt the symmetric key for encrypted file
What is an active cyber attack
In an active attack the attacker tried to disrupt a networks normalcy, modifies data, and tries to alter system resources
What is a passive cyber attack
The attacker eavesdropps on data and intercepts but the data is just seen not edited.
What is social engineering
The art of manipulating people to have them give up confidential information
What are 3 social engineering attacks
1 phishing attack - the user opens mail and unknowingly installs a virus
2 spear fishing attack- the attacker targets a specific individual or group with a phishing attack
3 whaling fishing attack- an phishing attack that targets the rich or powerful
What is a man-in-the-middle attack?
The attacker takes the ip address of the client - the attacker gets i between the client server communication
What is cybersecurity
Cybersecurity is the tech and process that is designed to protect networks and devices from attack damage or unauthorized access
What are advantages of cybersecurity
Protection of your business, increased productivity, inspires customer confidence, stops crashes, protects customers and clients.
What are the three main aspects of cybersecurity
1 confidentiality - this principle states that information and functions can only be accessed by authorized parties
2 integrity - this principal states that functions can be added altered or removed by only authorized clients
3 availability - this principle states that the functions have to be ready in demand
What are the two Main threats to cybersecurity
1 cybercrime
2 hacking
What is cybercrime
Any criminal activity that involves a device network or computer they are carried out against computers of devices directly to damage them
3 main types of cybercrime
1 computer assisted crimes- the criminal uses a computer as a tool in the process
2 computer as target of a crime- attacks against systems servers networks and the data stored on them
3 computers in Eden tel to the crime- this is a crime where a computer is related to the crime a crime can take place without a computer
Motives of cybercrime 8 o them
1 disrupting business continuity
2 information theft and manipulating data
3 creating fear and chaos
4 finacial gain
5 finacial loss to the victim
6 achieve a state's military objective
7 damage reputation of target
8 propergating religious or political beliefs
What's re the 8 types of hackers
Black hat hackers with extreme skill at hacking turning to malicious behavior
Grey hat
Individuals who jack offensively and defensively at times
White hat
Individuals using hacking skills for good an ethical hacker
Suicide hackers
Hackers who are not afraid of punishment
Script kiddie
Unskilled hacker who hacks with pre-built programs
Cyber terrorist
A skilled hacker motivated by political or religious beliefs to create fear and large scale disruption
State sponsored hacker
Individual employed by the government to attack other countries
Hacktivist
Hackers who promote an agenda by defacing websites and disabling websites
Worm virus
A malicious virus that replicates itself automatically spreading through a network
What is a malware attack
is a common cyber-attack and an umbrella term for various malicious programs delivered and installed on end-user systems and servers.
What is a drive by attack
drive-by download attack is a type of cyberattack where malicious code is downloaded and executed on a target device without the user's knowledge or permission. This type of attack is often used to deliver malware, such as worms, trojans, and ransomware.
What is a cross site scripting attack
A client side attack that targets users that are browsing the site. Typically occurs in areas of the site where users input information
What is a birthday attack
method of cracking cryptographic algorithms through matches in hash functions. It is based on the birthday paradox, according to which the probability of two people sharing a birthday is far higher than it seems — for a group of 23 people, for example, the probability is 50%.
Who is a cybersecurity expert
An individual employee by someone to protect their data they do this by finding vulnerabilities monitoring systems and network breach
What is a honeypot?
a decoy system in your network installed to lure potential intruders away from legitimate systems
What is cryptography?
It is the process involved in changing a readable word into an unreadable format for security
What is encryption?
scrambles information into an alternative form that requires a key or password to decrypt the information
What is decryption?
The process of converting data that has been converted into an unreadable form of text back to its original form
What is cipher text
Text that has been encrypted
What is clear text
Normal text
What does pki stand for
Public Key Infrastructure
What is PKI (Public Key Infrastructure)?
Pki is a set of policies which secures the communication of a server and. A client
What does PKI do?
Pki enables trusted digital identities for people
Pki grants secure access to digital resources
Pki is a certificat data which ensures the trustworthiness of digital data