Cybersecurity Middle School TSA

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/72

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

73 Terms

1
New cards

What is the OSI model?

Open System Interconnection model that uses 7 layers to communicate over a network

2
New cards

Unicast

a message that is sent from a single sender to a single recipient

3
New cards

Multicast

A message sent from one sender to multiple recipients

4
New cards

Broadcast

One sender to all recipients

5
New cards

What does DNS stand for?

Domain Name System

6
New cards

What's does the dns do

The internet's phone book- it maps the domain name to the ip address, ie- if I query bbc for me . Com the dns sends the ip of bbc for me .com and send the computer to the ip.

7
New cards

What is a firewall

Software and/or hardware that can block incoming or outgoing traffic from the internet to your computer- it secures a network

8
New cards

3 types of firewalls?

Packet-filtering- analyzes incoming packets and if they match a establish rule set are let in

Proxy- filter traffic on the application level

Stateful multilayer inspection smli- they filter packets at the network transport and application layers the packets are compared to trustworthy packets.

9
New cards

What is a vpn

Virtual Private Network- a secure tunnel from the client to the vpn server

10
New cards

What is distributed processing?

Multiple computers share the same processer

11
New cards

What are some advantages of distributed processing?

Reliable- multiple systems lower cost- cheaper than buying one big mainframe- easy to expand- and can better recover lost data.

12
New cards

What is the TCP/IP?

Transmission Control Protocol- a set of communication protocols that are used to interconnect network devices on the internet/Internet Protocol-gets packets to their destinations- tcpip is a compressed version of the osi model

13
New cards

What are the 4 layers of the tcp/ip

Network-internet-transport- application from bottom to top

14
New cards

What are the Sven layers of the osi model

Physical link- data link- network- transport-session- presentation- application layer

15
New cards

What is domain

Centralized network model- one administer manages the domain and its resources- good for large network-the computer can be connected to any network

16
New cards

What is workgroup

Decentralized network-each user individually manages their own computer- good for small network- all computer should connect to the same LAN- local area network

17
New cards

What is data encapsulation?

The procedure of adding headers and trailer to data. The headers and trailers add the source and destination address

18
New cards

What are 8 steps to keep a computer secure

2 way authentication- secure passwords- regular updates-antivirus-firewall-no phishing-cryptography(scrambling data ie conputer = qeidbworb)- securing dns

19
New cards

3 languages used in cybersecurity

Java-c- and c++

20
New cards

What is the most secure language

Java

21
New cards

What are the Seven most common sources of malware

Pop ups- removable media(usb)- documents and executable files .rar . Exe- internet downloads- network connections public Wi-Fi-email attachments- and malicious advertisements

22
New cards

Threats a company can face to their security

Natural- tornado fire etc-man made-theft or hacker-thechnical- software bugs or server fail-supply system- electricity or a short circuit

23
New cards

What is black box testing what is white box testing

White box- the ethical hacker is told everything about the system before probing for weaknesses- black box- 0 Knowles's of system before trying to find a weakness

24
New cards

What is use case testing

A black box test testing what users will do

25
New cards

Static testing

Done early in dev life cycle-includes walk through and code review-is 100% accurate in a short time-static testing is about prevention

26
New cards

Dynamic testing

Done with the finished product-includes functional and non functional testing- takes more time-it us about cure

27
New cards

What are the test levels in software testing

Module- checking sub programs- integration testing- testing larger parts of the program- system testing - test the whole system-acceptance testing-test by a quality insurance team to meet client requirements.

28
New cards

3 steps to resolve issues while testing

Record-report issues- and control-define teh issue management process

29
New cards

What is virtual memory

a portion of the hard disk designated to function as additional RAM

30
New cards

What are the six scheduling algorithms (for program priority)

First come first serve -fcfs-shortest job first-priority scheduling- a schedule person chooses schedule- multipem level ques-shortest remaining time-round robin- all get equal time

31
New cards

5 steps involved inhacking a network or server

1 reconnaissance the hacker finds out information

2 scanning- use reconnaissance information to use programs to gain more in depth knowledge

3 gain access/ attack in this phase the hacker gains access and jacks the target

4 maintain access- sometimes the hacker will ensure they have a way back into the system

5 cover tracks teh hacker will do anything to minimize their digital footprint

32
New cards

Name 6 sniffing tools

Wire shark tcp dump msn sniffer 2 ettercap dsniff ether ape

33
New cards

What is an os

An operating system is a software program that is an intermediary between computer program and hardware it is needed for the computer to actually work provides a platform of communication between hardware and teh software

34
New cards

What are the 5 different types of os's

1 batched is

2 distributed

3time sharing

4multi-programmed

5real time

35
New cards

What does zombie mean in Linux

The process is terminated but the process table still holds information

36
New cards

What does SQL stand for?

Structured Query Language

37
New cards

What is an SQL injection?

Where an attacker injects malicious input into an sql. Statement.

38
New cards

What is an sql statement

A set of instructions

39
New cards

What is spoofing

Spoofing is where the attacker pretends to be a different person of organization and sends a legitimate looking email

40
New cards

What is a DDoS attack?

A ddos attack is an attack used to restrict user access by flooding the traffic that is used to access resources

41
New cards

What is a bot

a program that performs a repetitive task

42
New cards

What is a botnet

A network of bots in a DDoS attack.

43
New cards

How is a ddos attack carried out

The attacker uses a botnet to flood traffic in the servers of a specific resource and neuters the ability for users to access the resource

44
New cards

What is ransomware?

A form of malware the blocks the access of a user to their own data until paid a certain sum of money

45
New cards

What are the 3 type of ransoms ware

Scareware - a form of malware that uses social engineering or the perception of a threat to scare the user into buying something

Screen lockers- locking a computers login screen and showing an official looking message

Encrypting random ware- the random ware displays a message asking for money to receive the asymmetric key needed to decrypt the symmetric key for encrypted file

46
New cards

What is an active cyber attack

In an active attack the attacker tried to disrupt a networks normalcy, modifies data, and tries to alter system resources

47
New cards

What is a passive cyber attack

The attacker eavesdropps on data and intercepts but the data is just seen not edited.

48
New cards

What is social engineering

The art of manipulating people to have them give up confidential information

49
New cards

What are 3 social engineering attacks

1 phishing attack - the user opens mail and unknowingly installs a virus

2 spear fishing attack- the attacker targets a specific individual or group with a phishing attack

3 whaling fishing attack- an phishing attack that targets the rich or powerful

50
New cards

What is a man-in-the-middle attack?

The attacker takes the ip address of the client - the attacker gets i between the client server communication

51
New cards

What is cybersecurity

Cybersecurity is the tech and process that is designed to protect networks and devices from attack damage or unauthorized access

52
New cards

What are advantages of cybersecurity

Protection of your business, increased productivity, inspires customer confidence, stops crashes, protects customers and clients.

53
New cards

What are the three main aspects of cybersecurity

1 confidentiality - this principle states that information and functions can only be accessed by authorized parties

2 integrity - this principal states that functions can be added altered or removed by only authorized clients

3 availability - this principle states that the functions have to be ready in demand

54
New cards

What are the two Main threats to cybersecurity

1 cybercrime

2 hacking

55
New cards

What is cybercrime

Any criminal activity that involves a device network or computer they are carried out against computers of devices directly to damage them

56
New cards

3 main types of cybercrime

1 computer assisted crimes- the criminal uses a computer as a tool in the process

2 computer as target of a crime- attacks against systems servers networks and the data stored on them

3 computers in Eden tel to the crime- this is a crime where a computer is related to the crime a crime can take place without a computer

57
New cards

Motives of cybercrime 8 o them

1 disrupting business continuity

2 information theft and manipulating data

3 creating fear and chaos

4 finacial gain

5 finacial loss to the victim

6 achieve a state's military objective

7 damage reputation of target

8 propergating religious or political beliefs

58
New cards

What's re the 8 types of hackers

Black hat hackers with extreme skill at hacking turning to malicious behavior

Grey hat

Individuals who jack offensively and defensively at times

White hat

Individuals using hacking skills for good an ethical hacker

Suicide hackers

Hackers who are not afraid of punishment

Script kiddie

Unskilled hacker who hacks with pre-built programs

Cyber terrorist

A skilled hacker motivated by political or religious beliefs to create fear and large scale disruption

State sponsored hacker

Individual employed by the government to attack other countries

Hacktivist

Hackers who promote an agenda by defacing websites and disabling websites

59
New cards

Worm virus

A malicious virus that replicates itself automatically spreading through a network

60
New cards

What is a malware attack

is a common cyber-attack and an umbrella term for various malicious programs delivered and installed on end-user systems and servers.

61
New cards

What is a drive by attack

drive-by download attack is a type of cyberattack where malicious code is downloaded and executed on a target device without the user's knowledge or permission. This type of attack is often used to deliver malware, such as worms, trojans, and ransomware.

62
New cards

What is a cross site scripting attack

A client side attack that targets users that are browsing the site. Typically occurs in areas of the site where users input information

63
New cards

What is a birthday attack

method of cracking cryptographic algorithms through matches in hash functions. It is based on the birthday paradox, according to which the probability of two people sharing a birthday is far higher than it seems — for a group of 23 people, for example, the probability is 50%.

64
New cards

Who is a cybersecurity expert

An individual employee by someone to protect their data they do this by finding vulnerabilities monitoring systems and network breach

65
New cards

What is a honeypot?

a decoy system in your network installed to lure potential intruders away from legitimate systems

66
New cards

What is cryptography?

It is the process involved in changing a readable word into an unreadable format for security

67
New cards

What is encryption?

scrambles information into an alternative form that requires a key or password to decrypt the information

68
New cards

What is decryption?

The process of converting data that has been converted into an unreadable form of text back to its original form

69
New cards

What is cipher text

Text that has been encrypted

70
New cards

What is clear text

Normal text

71
New cards

What does pki stand for

Public Key Infrastructure

72
New cards

What is PKI (Public Key Infrastructure)?

Pki is a set of policies which secures the communication of a server and. A client

73
New cards

What does PKI do?

Pki enables trusted digital identities for people

Pki grants secure access to digital resources

Pki is a certificat data which ensures the trustworthiness of digital data