Cybersecurity Exam 2

0.0(0)
studied byStudied by 0 people
0.0(0)
full-widthCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/55

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

56 Terms

1
New cards

Internet

A network of computers and similar devices throughout the world

2
New cards

Uses of the internet

Email, streaming music and video, and cloud storage

3
New cards

Web (or World Wide Web)

A collection of pages, which are digital documents of content. Each page is stored on a website that can transmit content on request

4
New cards

Server

The digital address of a computer

5
New cards

Browsers

People access websites using programs that fetch and display webpages and sometimes pass user data back to the site

6
New cards

Search engine

A program that locates webpages matching a query from a user

7
New cards

Man-in-the-Browser

Code inserted into a browser can read, copy, and redistribute anything the users enters in the browser. Trojan horse that intercepts data passing through the browser

8
New cards

Keystroke Logger (or key logger)

Either hardware or software that records keystrokes entered by the user

9
New cards

Page-in-the-Middle

A type of browser attack in which a user is redirected to another page

10
New cards

Program Download Substitution

The attacker presents a page with a desireable and seemingly innocuous program for the user to download

11
New cards

User-in-the-Middle

Puts a human between two automated processes so that the human unwittingly helps spammers register automatically for free email accounts

12
New cards

CAPTCHA (Completely Automated Public Turing to tell Computers and Humans Apart)

A puzzle that supposedly only a human can solve, so a server apllication can distinguish between a human who makes a request and an automated program generating the same request repeatedly

13
New cards

Shared Secret

Something only the two entities wanting to authenticate should know. Must be something no malicious middle agent can know

14
New cards

One-Time Password

Good for only one use. The two end parties need to have a shared secret list or passwords (or a way to generate passwords as needed)

15
New cards

Out-of-Band Communication

Transferring one fact along a communication path seperate from that of another fact (Phone call, Text, or smart phone authenticator app to confirm login)

16
New cards

Successful Identification and Authentication

Shared secret, One-time password, Out-of-band communication, Continuous authentication

17
New cards

Browser Attack Types

Man-in-the-Browser, Keystroke Logger, Page-in-the-Middle, Program Download Substitution, User-in-the-Middle

18
New cards

Defaced Website

Occurs when an attacker replaces or modifies the content of a legitimate website

19
New cards

Fake Website

Successful attackers can take the time and care to prepare convincing forgeries. The attacker can get all the images a real site uses

20
New cards

Attacks Targeting Users

False or misleading content:
Defaced website, fake website, fake code

21
New cards

Integrity Checksums

A mathematical function that reduces a block of data (including an executable program) to a small number of bits. Can detect altered content on a website

22
New cards

Signed Code or Data

A digital signature is an electronic seal that can vouch for the authenticity of a file or other data object. The recipient can inspect the seal to verify that it came from the person or organization believed to have signed the object and that the object was not modified after it was signed

23
New cards

Protecting Websites Against Malicious Modification

Integrity checksums, Signed code or data

24
New cards

Cookie

A data file containing any data the page owner wants, in any format, including being encrypted

25
New cards

Web bug

Can report page traversal patterns to central collecting points, compomising privacy. Used by a 3rd party for marketing (or spying on you)

26
New cards

Clickjacking

Tricking a user into clicking a link by disguising what the link points to. An invisible prompt to approve something dangerous 

27
New cards

Framing (or using an iframe)

A structure that can contain all or part of a page, can be placed and moved anywhere on another page, and can be layered on top or underneath other frames

28
New cards

Drive-by download

An attack in which code is downloaded, installed, and executed on a computer without the user’s permission and usually without the user’s knowledge

29
New cards

Malicious Web Content

Substitute content on a real website, web bug, clickjacking, drive-by download

30
New cards

Scripting or injection attacks

An unauthorized request that is delivered as a script or injected into the dialog with the server

31
New cards

Code Within Data

Executable code contained within what might seem to be ordinary data

32
New cards

Cross-Site Scripting (or XSS)

Executable code is included in the interaction between client and server and executed by the client or server

33
New cards

Persistent cross-site scripting attack

Such an attack can harm the server side if the server interprets and executes the script or saves the script and returns it to other clients (who would then execute the script)

34
New cards

SQL Injection

Operates by inserting code into an exchange between a client and database server

35
New cards

Database management systems (DBMS)

Use a language called SQL (structured query language) to represent queries to the DBMS

36
New cards

Dot-Dot-Slash

A malicious user cannot break out of the subdirectory by naming a file directly but the attacker can climb backward through the directory structure to get to the desired point, enabling an attacker to modify or delete it

37
New cards

Server-Side Include

This weakness takes advantage of the fact that webpages can invoke a particular function automatically and execute commands

38
New cards

Ransomware attack

The criminal seizes a valuable resource from the victim, offering to return it on payment of a ransom

39
New cards

Apps

Single-purpose applications intended to run on a particular platform

40
New cards

Mobile Devices

Computers that you can hold in a hand — smartphones, smartwatches, and tablets 

41
New cards

Open Web App Security Project (OWASP)

An international foundation whose mission is to improve the security of web apps

42
New cards

Injection attack

The use of input data to affect an app’s behavior maliciously

43
New cards

Spyware

Spies on your activity, transerring data without your permission or even knowledge

44
New cards

Jailbreak

Execute code that removes the operating system’s limit on the source of apps

45
New cards

Sideloading

Installing an app from a source other than the vendor’s app store

46
New cards

DevOps

A set of practices that unites development (Dev) and operations (Ops), attempting to bring code into use rapidly but with control

47
New cards

Agile methods

Seeks to bring about code that can adapt rapidly to changing user needs

48
New cards

Static application security testing (SAST)

Sometimes called white-box or clear-box testing tools because they inspect inside the application

49
New cards

Dynamic application security testing (DAST)

Sometimes called black-box testing tools because they do not examine the internals of an application but look only at its activity

50
New cards

Interactive application security testing (IAST)

Combine static and dynamic tools. Can analyze code as it is being written and then as it is compiled and run

51
New cards

Runtime application self-protection (RASP)

Continuously monitors application inputs to detect and prevent both known and unknown threats at the point of the vulnerability

52
New cards

Spam

Ficticious or misleading email. Often use realistic topics for false messages to lure recipients to follow a malicious link

53
New cards

Phishing

The email message tries to trick the recipient into disclosing private data or taking another unsafe action

54
New cards

Smishing

A phishing attack transmitted by SMS (text) message

55
New cards

Vishing

Uses a voice phone call

56
New cards

Spear phishing

Tempts recipients by seeming to come from sources the receiver knows and trusts