CS356 Midterm 2Study Topics (1)

0.0(0)
Studied by 0 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/43

encourage image

There's no tags or description

Looks like no tags are added yet.

Last updated 11:16 PM on 11/12/24
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

44 Terms

1
New cards

Access Control

A method used to regulate who can view or use resources in a computing environment.

2
New cards

MAC

Mandatory Access Control; a policy in which access rights are assigned based on regulations determined by a central authority.

3
New cards

DAC

Discretionary Access Control; access rights are assigned based on the discretion of the owner of a resource.

4
New cards

RBAC

Role-Based Access Control; access rights are based on roles assigned to users.

5
New cards

ABAC

Attribute-Based Access Control; access rights are based on attributes of users, resources, and the environment.

6
New cards

SQL Injection

A code injection technique that exploits a security vulnerability in an application by inserting malicious SQL statements.

7
New cards

Denial of Service (DoS)

An attack intended to shut down a machine or service, making it inaccessible to intended users.

8
New cards

SYN/SYN-ACK

The initial packets in a TCP handshake used to establish a connection; attack exploits the connection table.

9
New cards

Malware

Malicious software designed to harm, exploit, or otherwise compromise computer systems.

10
New cards

Worms

A type of malware that replicates itself to spread to other computers, often using a network.

11
New cards

Trojan Horse

A type of malware that disguises itself as legitimate software to gain access to systems.

12
New cards

RootKit

A collection of tools used by an attacker to hide the presence of certain processes, files, or system data.

13
New cards

Phishing

A technique used to trick users into providing sensitive information by pretending to be a trustworthy entity.

14
New cards

Encryption

The process of converting information or data into a code to prevent unauthorized access.

15
New cards

Incident Response Plan

A set of procedures for addressing and managing the aftermath of a security breach or cyber attack.

16
New cards

Data Base Security

Measures taken to protect a database from unauthorized access and data corruption.

17
New cards

Canonical Form

A database design standard where data is structured to eliminate redundancy.

18
New cards

Social Engineering

Manipulating individuals to divulge confidential information by exploiting human psychology.

19
New cards

ABAC Attributes

Attributes used in Attribute-Based Access Control to determine access rights, including user attributes, resource attributes, and environmental contexts.

20
New cards

ABAC Rules

Policies that define conditions for granting or denying access based on the attributes of users and resources.

21
New cards

Relational Database Unique ID

A unique identifier assigned to each row in a relational database table to ensure that each record can be uniquely accessed.

22
New cards

Relational Database Keys

Attributes or sets of attributes that are used to uniquely identify a record in a table; includes primary and foreign keys.

23
New cards

Relational Database Indexes

Data structures that improve the speed of data retrieval operations on a database table by enabling rapid searches.

24
New cards

Relational Database Canonical Form

A design standard that minimizes data duplication and errors by structuring data appropriately, using keys to reference other tables.

25
New cards

JOIN Operations

Database operations that combine rows from two or more tables based on related columns, often facilitated by keys.

26
New cards

CREATE TABLE

An SQL command used to create a new table in a database.

27
New cards

DROP TABLE

An SQL command used to delete a table and all its data in a database.

28
New cards

INSERT

An SQL command used to add new rows of data to a table.

29
New cards

UPDATE

An SQL command used to modify existing data in a table.

30
New cards

DELETE

An SQL command used to remove existing rows from a table.

31
New cards

SELECT

An SQL command used to query and retrieve data from one or more tables.

32
New cards

WHERE Clause

An SQL clause used to specify a condition while fetching data from a table, allowing for filtering of records.

33
New cards

SORT BY

An SQL clause used to sort the result set of a query based on one or more columns, either in ascending or descending order.

34
New cards

INNER JOIN

A type of JOIN operation that returns records with matching values in both tables involved.

35
New cards

LEFT JOIN

A type of JOIN operation that returns all records from the left table and the matched records from the right table.

36
New cards

RIGHT JOIN

A type of JOIN operation that returns all records from the right table and the matched records from the left table.

37
New cards

FULL OUTER JOIN

A type of JOIN operation that returns all records when there is a match in either left or right table records.

38
New cards

CROSS JOIN

A type of JOIN that returns the Cartesian product of two tables, combining every row from the first table with every row from the second.

39
New cards

SQL Clauses

Components of SQL statements that define specific conditions or actions, such as SELECT, WHERE, and ORDER BY.

40
New cards

Encrypted Databases

Databases that use encryption techniques to secure data stored within, protecting it from unauthorized access.

41
New cards

Need for Encryption in Cloud DB Engines

Encryption is necessary in cloud database engines to ensure that sensitive information is protected against breaches and unauthorized access.

42
New cards

Encrypted Queries

Queries that are processed in an encrypted form to protect data while in transit; however, complexities arise when using certain operators like < or > with encrypted data.

43
New cards

Limitations of Encrypted Queries

Encrypted queries can face challenges with conditionals due to the nature of encryption, which may not support comparison operations directly.

44
New cards

Homomorphic Encryption

A type of encryption that allows computations to be performed on encrypted data without needing to decrypt it first, providing a solution for query limitations.

Explore top flashcards

flashcards
AP gov
152
Updated 1172d ago
0.0(0)
flashcards
Cells Structure
30
Updated 1234d ago
0.0(0)
flashcards
Islam Glossary
41
Updated 160d ago
0.0(0)
flashcards
FDNT 151 test 1
80
Updated 1150d ago
0.0(0)
flashcards
Grade 10 plant biology
74
Updated 1059d ago
0.0(0)
flashcards
Exam Three Flashcards
87
Updated 737d ago
0.0(0)
flashcards
Anatomy Quiz 2
29
Updated 211d ago
0.0(0)
flashcards
AP gov
152
Updated 1172d ago
0.0(0)
flashcards
Cells Structure
30
Updated 1234d ago
0.0(0)
flashcards
Islam Glossary
41
Updated 160d ago
0.0(0)
flashcards
FDNT 151 test 1
80
Updated 1150d ago
0.0(0)
flashcards
Grade 10 plant biology
74
Updated 1059d ago
0.0(0)
flashcards
Exam Three Flashcards
87
Updated 737d ago
0.0(0)
flashcards
Anatomy Quiz 2
29
Updated 211d ago
0.0(0)