Cybersecurity Final

0.0(0)
studied byStudied by 1 person
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/56

flashcard set

Earn XP

Description and Tags

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

57 Terms

1
New cards
CAPTCHA
A system that can distinguish between a human and an automated program
2
New cards
Trojan Horse
malicous program disguised as legimiate softeware. users intentionally install ths
3
New cards
Worms
similar to virus, does not need human to spread, rather can replicate on own to ifect other computers
4
New cards
Phishing
Practice of sending frad emails that appear to be legimate
5
New cards
Spam
Irrelevant or inappropriate messaging sent through email to a large number of recipients; also known as junk mail.
6
New cards
top level domain
last segment of web address; follows immediately after last (.com, .net, .org, .gov)
7
New cards
social engineering
art of manipulating people so they give up confidendtial information, includes passwords, bank info, access to your computer
8
New cards
log files
file that keeps records of events that occur on a computer
9
New cards
LAN
made up of: clients/laptops Connected by: physical cable (wires)
10
New cards
Site Certificate
small data file that is validated by a “certificate authority” which allws an organization to have a secure website
11
New cards
cookie
small text based bits of information about your brownser that a web server saves
12
New cards
spyware
software that secretly collects information about you.
13
New cards
Typosquatting
Known as URL hijacking, form of cybersquatting that targets internet users who incorrectly type a website address into their web browser
14
New cards
backdoor
malicious software taht bypasses the normal, secure or restricted access
15
New cards
Script Files
Disgusing executable files as otehr file types, tricking user into executing a script
16
New cards
Ransomware
software that locks your computer or makes it inoperable, requiring you to pay someone to remove it
17
New cards
ecommerce
Buying and selling goods or services over internet
18
New cards
Confidentiality in CIA Triad
Protects info from unauthorized access
19
New cards
Integrity in CIA Triad
Ensuring accuracy and validity of information
20
New cards
Availability in CIA Triad
Ensuring info readily accessible to authorized users at all times
21
New cards
Protocol
Agreed method of communication
22
New cards
Host Machine
computer, tpically one on a network
23
New cards
Web server
computer that delivers files forming web pages across a network to requestiong clients
24
New cards
Port HTTP on
80
25
New cards
Port HTTPS on
443
26
New cards
Information Architecture
Way organization structure ogranizes info that is required by employees and/or customers
27
New cards
Passive Analysis
Analyze something without intefering or affecting it
28
New cards
IP Address
Identifing number for hosts and servers on internet. often includes a port number as part of address
29
New cards
Security Baseline
Starting point for data analysis
30
New cards
nslookup
command to look up domain names of ip addresses
31
New cards
netstat - n
converst IP address to domain names, to see just IP addresses use the -n flag
32
New cards
CD
command changes directory in powershell
33
New cards
Dir
command shows computer directory in powershell
34
New cards
CLS
command clears the screen in powershell
35
New cards
CTRL + C
command clears errors in powershell
36
New cards
Python in powershell
executes a python script
37
New cards
DDOS attack
a denial of service attack that targets websites and web servers
38
New cards
Whistleblower
employee that exposes injustice or criminal behavior that organization is committing
39
New cards
Social Ideology
Hackers engage in “hacktivism” to change aspects of society such as disrupting terrorists, promoting human rights, exposing injustice
40
New cards
Black Hat Hacker
Hacker who breaks laws, steals data, holds info for ransom, commits other criminal acts. Behavior meant to cause harm, draw attentio, or achieve personal gain
41
New cards
White Hat Hacker
Expert who has permission to perfom security tests and who fully discloses their activities. They report vulnerabilites and improve security of system. Noble behavior and good action align with society’s greater good
42
New cards
Grey Hat Hacker
Hacker uses illegal or unethical means to discover systems security vulnerabilities.
43
New cards
Industiral Espionage
companies steal info from competitors to gain upper hand or eliminate the competition
44
New cards
Botnet Malware
Software that replicates and infects many computers, turning the computer into a zombie
45
New cards
Keylogger
Software and hardware that track all keyboard clicks, including back spaces, to discover usernames, passwords, credit card numbers, and otehr sensitive info
46
New cards
Packet
Small units of data transmitted on a network. Collected together, they compose some larger data such as a document, a website, a movie, etc.
47
New cards
Decrypt
Decodes information
48
New cards
Encrypt
To write in code; to encode
49
New cards
Penetration Test (pen test)
performing a computer attack to evaluate the security of a system
50
New cards
IIS
Internet Infomration Services
51
New cards
IoT
Internet of Things
52
New cards
FTP
File transfer protocol; port 20
53
New cards
Inetpub
contains all the web pages and content that will be published on the web. It is the default directory for publishing web pages.
54
New cards
IIS Manager
Administration tool for the MS IIS web server. Allows administrators to define behavior and structure of websites run by IIS and supports secure site configurations.
55
New cards
Log File protection using IIS Manager
Change the file location to make it harder to find
56
New cards
FTP protection using IIS manager
Use the remove services tool in IIS manager to remove FTP functions
57
New cards
Direct Browsing
Use IIS manager to go to directory and then you disbale directory browsing