CSE 2102 - Module 11: Security and Privacy

0.0(0)
studied byStudied by 0 people
0.0(0)
full-widthCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/9

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

10 Terms

1
New cards

Risk

Asset + Threat + Vulnerability

2
New cards

Session Hijacking

attacker obtains session cookie and impersonates a legitimate user

3
New cards

Session Sniffing

attacker monitors unencrypted network traffic (especially on public Wi-Fi networks) to capture session IDs

4
New cards

Cross-Site Scripting (XSS)

Inject scripts into web pages that are then viewed by other users

5
New cards

SQL Injection

attacker supplies specially crafted input that gets interpreted as part of a database query. allows attacker to read, modify, or delete data

6
New cards

Denial of Service DoS

floods a target system with so many requests that it becomes unavailable to legitimate users

7
New cards

DDos

compromised computers (a botnet) generate the attack traffic, making it harder to defend against

8
New cards

Buffer Overflow

attacker sends more data to a program's memory buffer than it can handle, causing it to overflow

to prevent: use safe language, check input sizes, test, update

9
New cards

Man-in-the-Middle

attacker secretly intercepts and alters communication between two parties

to prevent: HTTPS, 2FA, avoid public WiFi or use VPN

10
New cards

Supply-Chain Attack

attacker inserts malicious code into software updates, dependencies, or hardware from trusted suppliers