1/24
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced | Call with Kai |
|---|
No analytics yet
Send a link to your students to track their progress
Confidentiality
Ensuring access to information is restricted only to users
Integrity
Ensuring that information is a true and accurate representation of data. It is also the prevention of unauthorized modification or destruction of information.
Availability
Ensuring that reliable access to the information by authorized users
Authentication
Prove who you are
Brute Force
software programs which automate the process of rapidly testing all possible combinations of characters.
Hashing
A one-way mathematical function that converts input (like a password) into a fixed-length string of characters.
Rainbow Table
A large file of pre-computed hash values used to crack passwords quickly.
Salt
A method of strengthening password storage by adding a random string before hashing.
SAM Registry Hive
A Windows system file that stores usernames and password hashes.
Passphrase
A string of words used instead of a short password
/etc/passwd
A Linux file that is not secure because multiple users can read it.
/etc/shadow
A Linux file that stores password hashes securely; only root has access.
Hash Collision
When two different inputs produce the same hash value.
MD5, SHA-256
Common algorithms used for hashing passwords.
An Operating System (OS)
is the core software that manages a computer's hardware and software resources
Malware
software intended to damage a computing system or to take partial control over its operation
Virus
a program that attaches to a host file with the goal of installing itself on a system.
Worm
program that reproduces itself and can transport from system to system without attaching to a file.
Ransomware
program that blocks access to files or block use of the device until an amount is paid
Spyware
software that gathers data and forwards it to a third party without the consent or knowledge of the user.
Trojan
files that appear to be legitimate programs
Backdoor
programs that create a mechanism for gaining access to a computer.
Zero Day
an attack that takes advantage of code flaws that have VERY recently been discovered.
Logic Bomb
small program that is timed to perform an operation on a system.
Botnet
a network of internet-connected devices infected with malware and controlled by a single cybercriminal