Computer Network Threats, Security Concepts, and Counter-Measures

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/134

flashcard set

Earn XP

Description and Tags

These vocabulary flashcards cover key terms and definitions spanning threat models, attack types, malware, security technologies, authentication, firewalls, incident response, backup strategies, and U.S. Air Force–specific security programs introduced in the lecture.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

135 Terms

1
New cards

Threat

Any circumstance or event with the potential to adversely affect a system by exploiting a vulnerability.

2
New cards

STRIDE Model

Microsoft framework for threat analysis: Spoofing, Tampering, Repudiation, Information Disclosure, Denial of Service, Elevation of Privilege.

3
New cards

Spoofing

Pretending to be someone or something else to gain unauthorized access.

4
New cards

Tampering

Unauthorized modification of data on disk, network, memory, or elsewhere.

5
New cards

Repudiation

Ability for a user to deny having performed an action or transaction.

6
New cards

Information Disclosure

Providing information to an entity not authorized to have it.

7
New cards

Denial of Service (DoS)

Exhausting resources so legitimate users cannot obtain service.

8
New cards

Elevation of Privilege

Gaining capabilities beyond those originally granted.

9
New cards

Inside Attack

Security breach initiated by an authorized insider misusing legitimate access.

10
New cards

Outside Attack

Security breach initiated by an outsider who gains illegitimate system access.

11
New cards

Botnet

Network of compromised computers remotely controlled to launch attacks or send spam.

12
New cards

Vulnerability

Flaw or weakness in design, implementation, or operation that could be exploited.

13
New cards

Network Attack

Intentional act to evade security services and violate security policy of a networked system.

14
New cards

Distributed Denial of Service (DDoS)

DoS attack launched simultaneously from multiple computers, often via a botnet.

15
New cards

Unauthorized Access

Obtaining resources a system should not provide to the attacker.

16
New cards

Data Diddling

Fraudulently altering data during entry or processing to change its meaning.

17
New cards

Data Destruction

Process of making data completely unreadable or unrecoverable.

18
New cards

Degaussing

Using a strong magnetic field to erase data on magnetic media.

19
New cards

Social Engineering

Non-technical attack relying on psychological manipulation to obtain confidential info.

20
New cards

Phishing

Mass fraudulent solicitation (email/text/web) to acquire sensitive data.

21
New cards

Spear Phishing

Targeted phishing aimed at a specific individual or group.

22
New cards

Whaling

Spear phishing targeting high-value executives such as CEOs.

23
New cards

Baiting

Using enticing digital or physical lures (e.g., infected USB) to trick victims into running malware.

24
New cards

Malicious Code

Software/scripts written to cause undesired effects or security breaches.

25
New cards

Malware

Umbrella term for hostile or intrusive software such as viruses, worms, Trojans, etc.

26
New cards

Computer Virus

Self-replicating code that hides in programs or boot sectors and requires user action to spread.

27
New cards

Boot-Sector Virus

Virus residing in the first sector of media; loads at startup and infects every disk read.

28
New cards

File Infector Virus

Virus that attaches to executable files and activates when the file runs.

29
New cards

Macro Virus

Malicious code written in an application’s macro language, triggered when a file opens.

30
New cards

Logic Bomb

Hidden code that executes when a specific event or date occurs.

31
New cards

Trojan Horse

Program that performs expected functions while secretly installing unauthorized software or backdoors.

32
New cards

Worm

Self-replicating malware that spreads without user intervention, often across networks.

33
New cards

Ransomware

Malware that locks or encrypts data and demands payment for release.

34
New cards

Spyware

Hidden software that monitors user activity and sends data to a remote attacker.

35
New cards

Adware

Software that automatically displays advertisements, typically via pop-ups.

36
New cards

Rootkit

Stealthy software giving attackers privileged, often hidden, system access.

37
New cards

Vulnerability Scanning

Automated probing to identify hosts susceptible to known attacks.

38
New cards

Patching

Applying vendor-supplied fixes to remediate vulnerabilities or bugs.

39
New cards

User-Awareness Training

Education of users on security pitfalls and best practices to reduce risk.

40
New cards

Firewall

System that monitors and controls incoming and outgoing network traffic based on rules.

41
New cards

Anti-Spyware

Software that detects and prevents spyware infections or data collection.

42
New cards

Proxy Server

Intermediary system that forwards requests, providing security, privacy, and web filtering.

43
New cards

Mail Gateway

Server in a DMZ that scans and filters inbound/outbound email for spam and malware.

44
New cards

Anti-Virus

Software that detects, quarantines, or removes virus-infected files using signature patterns.

45
New cards

Syslog

Centralized logging protocol collecting logs from multiple devices.

46
New cards

Threat Agent

Entity (insider or outsider) capable of carrying out a threat.

47
New cards

Agent-Based NAC

Network Access Control requiring client software to report compliance before access.

48
New cards

Agentless NAC

NAC that performs compliance checks without installing client software.

49
New cards

Dissolvable Agent

Temporary NAC agent installed during connection and removed afterward.

50
New cards

Permanent Agent

Resident NAC software continuously monitoring a device’s posture.

51
New cards

Authentication

Process of verifying the identity of a user or system.

52
New cards

Something You Know

Knowledge-based authentication factor such as a password or PIN.

53
New cards

Something You Have

Possession-based factor like a smart card or token.

54
New cards

Something You Are

Biometric factor such as fingerprint or facial pattern.

55
New cards

Somewhere You Are

Location-based authentication using GPS or IP address.

56
New cards

Something You Do

Behavioral factor such as typing rhythm or gait.

57
New cards

Multifactor Authentication

Using two or more different factor categories for stronger authentication.

58
New cards

Single Sign-On (SSO)

Authenticate once to gain access to multiple systems without re-entering credentials.

59
New cards

802.1X

IEEE standard for port-based network access control requiring authentication before connection.

60
New cards

AAA

Combined services of Authentication, Authorization, and Accounting.

61
New cards

RADIUS

UDP-based AAA protocol for remote access authentication and accounting.

62
New cards

Diameter

TCP-based successor to RADIUS offering improved reliability and security.

63
New cards

TACACS+

Cisco AAA protocol separating authentication, authorization, and accounting over TCP.

64
New cards

Access Control List (ACL)

List of permissions specifying which users or systems can access a resource.

65
New cards

Software Development Life Cycle (SDLC)

Structured process for planning, creating, testing, and deploying software.

66
New cards

Waterfall Model

Linear SDLC where each phase completes before the next begins; no backtracking.

67
New cards

Agile Model

Iterative SDLC using short sprints allowing backtracking and continuous feedback.

68
New cards

Fuzzing

Testing method feeding random invalid data to find crashes or vulnerabilities.

69
New cards

Input Validation

Ensuring user-supplied data is checked for correctness and safety before processing.

70
New cards

Cross-Site Scripting (XSS)

Attack injecting malicious scripts into trusted web pages viewed by others.

71
New cards

Encryption

Transforming data into ciphertext unreadable without a decryption key.

72
New cards

Intrusion Detection System (IDS)

Monitors systems/networks for suspicious activity and alerts administrators.

73
New cards

Intrusion Prevention System (IPS)

Monitors and actively blocks or mitigates detected malicious activity.

74
New cards

HIDS

Host-based IDS running on individual systems to detect local threats.

75
New cards

NIDS

Network-based IDS analyzing traffic on network segments.

76
New cards

BIOS

Firmware that initializes hardware and starts the boot process in a PC.

77
New cards

CMOS

Chip storing BIOS settings such as boot sequence.

78
New cards

Secure Boot

Process verifying digital signatures of boot files to prevent unauthorized OS loading.

79
New cards

Full Disk Encryption (FDE)

Encrypting an entire hard drive so data is unreadable without authentication.

80
New cards

Trusted Platform Module (TPM)

Hardware chip storing cryptographic keys used by FDE like BitLocker.

81
New cards

Hardware Security Module (HSM)

Dedicated hardware card/appliance for managing cryptographic keys.

82
New cards

Packet-Filtering Firewall

Stateless firewall filtering traffic based on IP addresses and ports in packet headers.

83
New cards

Stateful Packet Inspection Firewall

Firewall tracking connection state to allow only packets matching valid sessions.

84
New cards

Application-Layer Firewall

Firewall inspecting packet payload and application commands for fine-grained control.

85
New cards

iptables

Linux command-line utility configuring firewall rules via policy tables.

86
New cards

Demilitarized Zone (DMZ)

Perimeter network segment between internal network and public internet hosting public-facing servers.

87
New cards

Extranet

Network zone granting selected external organizations controlled access to internal resources.

88
New cards

Guest Network

Isolated zone providing visitors internet access while blocking internal resources.

89
New cards

Incident

Assessed occurrence jeopardizing confidentiality, integrity, or availability of an information system.

90
New cards

Event

Any observable system or network occurrence that may indicate an incident.

91
New cards

First Responder (Incident)

Initial individual who takes charge of an incident and activates the response team.

92
New cards

Computer Incident Response Team (CIRT)

Group designated to handle, document, and resolve security incidents.

93
New cards

Root Cause Analysis

Process of determining the underlying reason an incident occurred.

94
New cards

Baseline Configuration

Documented initial secure state of a system serving as reference for future assessments.

95
New cards

Configuration Management

Process of maintaining systems in a known, consistent state through documented changes.

96
New cards

RAID 0

Striping across disks for speed without redundancy.

97
New cards

RAID 1

Mirroring data to a second disk for redundancy.

98
New cards

RAID 1+0 (RAID 10)

Striped set of mirrored pairs providing speed and fault tolerance.

99
New cards

RAID 5

Striping with single parity enabling tolerance of one drive failure.

100
New cards

RAID 6

Striping with double parity tolerating two simultaneous drive failures.