ITI TEST 3 KEY TERMS WEEK 6/7/8

4.7(3)
studied byStudied by 1287 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/51

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

52 Terms

1
New cards

Encryption

A mathematical process that makes a message unreadable except to someone with the decryption key.

2
New cards

Decryption

The process of making a scrambled message or data understandable.

3
New cards

Key

In cryptography, a piece of data that enables encryption or decryption of a message.

4
New cards

Data “at rest”

Information stored on a device like a mobile phone, laptop, or server.

5
New cards

Data “in transit”

Information moving over a network from one place to another.

6
New cards

VPN (Virtual Private Network)

Encrypts internet communications for secure connection to a network.

7
New cards

HTTPS (S-secure)

uses encryption to better protect the data you send to websites and the information they return to you, from prying eyes.

8
New cards

End-to-End Encryption

protects messages in transit all the way from sender to receiver. It ensures that information is turned into a secret message by its original sender (the first “end”) and decoded only by its final recipient (the second “end”). No one, including the app you are using, can “listen in” and eavesdrop on your activity.

9
New cards

Data

Collection of information, stats, facts, measurements, and descriptions.

10
New cards

Metadata

Information about digital communications, like email subjects and conversation length.

11
New cards

OPSEC

the process of protecting information about one’s activities that may be important to a potential adversary. It is a process that seldom goes beyond the digital realm.

12
New cards

SSD

Guide for protecting against electronic surveillance with privacy tools.

13
New cards

Simple Substitution Cipher

Replaces single letters with specified ones in a fixed substitution alphabet. The combination of the plaintext and ciphertext alphabet forms the key of this cipher.

14
New cards

Caesar Cipher

Rotates the plaintext alphabet by a fixed number of places.

15
New cards

ROT13

Substitution Cipher | Replaces each letter with its partner 13 characters further along the alphabet. It provides virtually no cryptographic security

16
New cards

ROT5

Rotates numbers 0-9 in a message, clouding numeric values in a message.

17
New cards

ROT18

Combination of ROT13 and ROT5, rotating letters and numbers separately.

18
New cards

ROT47

uses all ASCII code points that range from 33 to 126 as the plaintext alphabet and rotates it by 47 characters. It can be used to obfuscate lowercase and uppercase letters, numbers, and punctuation symbols.

19
New cards

ROT8000

Uses the full Unicode Basic Multilingual Plane as the plaintext alphabet, which theoretically contains 65,536 characters

20
New cards

Social Engineering

Influencing a person to take actions, positive or negative.

21
New cards

Smishing

stands for SMS phishing or phishing through text messages. With a simple click, one’s credentials could be stolen, malware could be loaded on one’s mobile device, and sometimes both.

22
New cards

Vishing

Voice phishing through phone calls to deceive and steal information.

23
New cards

Phishing

Impersonating legitimate entities to trick people into providing personal information. It is the most dangerous of the four main vectors (smishing, vishing, phishing, impersonation).

24
New cards

Impersonation

Pretending to be someone else for malicious purposes like identity theft.

25
New cards

OSINT

the lifeblood of every social engineering engagement. It is also the piece that should have the most time spent on it which is why it occupies the first and largest piece of the pyramid. Documentation is one piece of OSINT that is rarely addressed.

26
New cards

Pretext Development

based on the findings from the OSINT period, the next step is to begin developing your pretexts. This is a crucial piece that is best done with OSINT in mind. In this phase, you see what changes or additions need to be made to ensure success.

27
New cards

Attack Plan

 having a pretext does not mean you are ready. The next stage is to plan out the three Ws: what, when, and who.

28
New cards

Attack Launch

launching the attack requires preparation but not scripted preparation that would not allow you to be dynamic. The use of an outline is recommended

29
New cards

Reporting

a report on the attacks is important because it is the very pinnacle that the rest of the pyramid rests on

30
New cards

Hacktivism

use of computer-based techniques such as hacking as a form of civil disobedience to promote a political agenda or social change.

31
New cards

Aaron Swartz

An agitator for free access to information on the internet who downloaded more than four million articles and reviews onto his laptop computers from a subscription-only digital storehouse, involved in Reddit and RSS development.

32
New cards

Information Security

the protection of information and information systems from unauthorized access, use, disclosure, disruption, modification, or destruction in order to ensure confidentiality, integrity, and availability

33
New cards

Confidentiality

preserving authorized restrictions on information access and disclosure

34
New cards

Integrity

guardian against improper information modification or destruction and ensuring information non-repudiation and authenticity

35
New cards

Availability

ensuring timely and reliable access to and use of information

36
New cards

Security Controls

the management, operational, and technical controls (safeguards, countermeasures) prescribed for a system to protect the confidentiality, availability, and integrity of the system and its information

37
New cards

Information System

discrete set of information resources organized for the collection, processing, maintenance, use, sharing, dissemination, or disposition of information

38
New cards

Information

  • Facts or ideas which can be represented (encoded) as various forms of data

  • Knowledge (data instructions) in any medium or form that can be communicated between system entities

39
New cards

Risk

can never be completely eliminated

40
New cards

Risk Management

striking a balance between usability and implementation of protection

41
New cards

Impact Levels

  • Federal organizations use these 

  • High, moderate and low 

  • Identify/categorize impact that a loss of confidentiality, integrity, or availability of info/system may have on organizations operation

  • Allows them to identify appropriate protections

42
New cards

Privacy

  • Past: two functions were discussed as if they cannot coexist in a system 

  • Today: relationship between privacy and security is essential 

  • It relates problems that individuals may experience as a result of authorized processing of their information throughout the data life cycle

43
New cards

Vulnerability

a weakness in a system, system security procedure, internal controls, or implementation that could be exploited by a threat source

44
New cards

Threat Events

  • incident/situation that could potentially cause undesirable consequences/impacts 

  • Example: hacker installing a keystroke monitor on an organizational system

45
New cards

Threat Sources (Adversarial)

 sources are individuals, groups, organizations, or entities seek to exploit and organizations dependence on cyber resources

46
New cards

Threat Sources (Non-Adversarial)

sources refer to natural disasters or erroneous actions taken by individuals in the course of executing day to day responsibilities

47
New cards

National Security Agency (NSA)

become the largest, most covert, and potentially most intrusive intelligence agency ever

48
New cards

Data Mining

everything a person does becomes charted on a graph so the NSA is able to paint a more detailed picture of someone’s life

49
New cards

Advanced Encryption Standard (AES)

Symmetric encryption and is considered so strong that the NSA has even approved its use for top-secret US government communications.

50
New cards

Lists (Python Concept)

ordered, changeable, allows duplicate

51
New cards

Sets (Python Concept)

unordered, changeable, doesn’t allow duplicates

52
New cards

Dictionaries (Python Concept)

ordered, changeable, doesn’t allow duplicates (except values).