Cyber Security Lab Flashcards

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/30

flashcard set

Earn XP

Description and Tags

Flashcards of key vocabulary terms and definitions from the Cyber Security Lab lecture notes.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

31 Terms

1
New cards

Section 65. Tampering with computer source documents

Any one who purposely covers up, obliterates, changes, or causes another to stow away, annihilate, or modify any PC source code utilized for a PC, PC program, PC framework or PC organization, when the PC source code is needed to be kept or kept up by law. Imprisonment as long as three years, or with fine which may stretch out up to two lakh rupees, or with both.

2
New cards

Section 66. Computer related offences

If any individual, unscrupulously or falsely, does any demonstration alluded to in section 43. Imprisonment for a term which may stretch out to three years or with fine which may reach out to five lakh rupees or with both.

3
New cards

Section 67. Punishment for publishing or transmitting obscene material in electronic form

Whoever distributes or sends or causes to be distributed or communicated in the electronic structure, any material which is scurrilous or claims to the lecherous interest. Imprisonment for a term which may stretch out to three years and with fine which may reach out to five lakh rupees and in case of second or resulting conviction with detainment of one or the other portrayal for a term which may stretch out to five years and furthermore with

4
New cards

Section 68. Power of Controller to give directions

The Controller may, by request, direct a Certifying Authority or any worker of such Authority to take such measures or stop continuing such exercises as indicated in the request if those are important to guarantee. Imprisonment for a term not surpassing two years or a fine not surpassing one lakh rupees or with both.

5
New cards

Section 69. Power to issue directions for interception or monitoring or decryption of any information through any computer resource

This Section of the Information Technology Act empowers the Central or State Government or any other competent authority to direct any agency of the appropriate government to monitor, intercept or decrypt any information transmitted, generated, received or stored in any computer resource. Imprisonment for a term which may reach out to seven years and will likewise be responsible to fine.

6
New cards

Section 70. Protected system

The appropriate Government may, by notification in the Official Gazette, declare any computer resource which directly or indirectly affects the facility of Critical Information Infrastructure, to be a protected system. Imprisonment of one or the other depiction for a term which may reach out to ten years and will likewise be obligated to fine.

7
New cards

Section 71. Penalty for misrepresentation

Whoever makes any distortion to, or smothers any material reality from the Controller or the Certifying Authority for acquiring any permit or Certificate, by and large. Imprisonment for a term which may stretch out to two years, or with fine which may reach out to one lakh rupees, or with both.

8
New cards

Section 72. Penalty for Breach of confidentiality and privacy

It provides for a criminal penalty where a government official discloses records and information accessed in the course of his or her duties without the. Imprisonment for a term which may stretch out to two years, or with fine which may reach out to one lakh rupees, or with both.

9
New cards

Section 73. Penalty for publishing Certificate false in certain particulars

It is for publishing electronic Signature Certificate false in certain particulars. Any person who contravenes the provisions of sub-section 1 shall be punished with imprisonment for a term which may extend to two years, or with fine which may extend to one lakh rupees, or with both. Imprisonment for a term which may stretch out to two years, or with fine which may reach out to one lakh rupees, or with both.

10
New cards

Section 74. Publication for fraudulent purpose

Whoever intentionally makes, distributes or in any case makes accessible a Certificate for any fake or unlawful reason. Imprisonment for a term which may reach out to two years, or with fine which may stretch out to one lakh rupees, or with both.

11
New cards

Section 75. Act to apply for offence or contravention committed outside India

If any person have committed an offence, or contravention committed outside India, and if the act or conduct constituting the offence or contravention involves

12
New cards

Section 76. Confiscation

Any PC, PC framework, floppies, reduced plates, tape drives or some other frill related thereto, in regard of which any arrangement of this Act, rules, requests or guidelines made thereunder has been or is being contradicted, will be obligated to seizure

13
New cards

Section 77. Compensation, penalties or confiscation not to interfere with other punishment

No remuneration granted, punishment forced or seizure made under this Act will forestall the honor of pay or inconvenience of some other punishment or discipline under some other law for the time being in power.

14
New cards

Section 78. Power to investigate offences

Despite anything contained in the Code of Criminal Procedure, 1973 (2 of 1974), a cop not underneath the position of will explore any offense under this Act.

15
New cards

Siloscape Malware

Malware Targeting Windows Containers that exploits vulnerabilities in common cloud applications or vulnerable web page or database and then utilizes windows container escape techniques, executes code on underlying node and then spreads in poorly configured Kubernetes clusters to open a backdoor in order to run/deploy malicious containers.

16
New cards

Sarbloh Ransomware

Ransomware spreading via specially crafted malicious documents sent as spear phishing email attachments. Once executed, it encrypts files on affected system and renames the encrypted files with the Sarbloh extension to make them unusable.

17
New cards

Adrozek Malware

Browser modifier malware distributed via classic drive-by download schemes. Installs the Adrozek malware and proceeds to obtain reboot persistence. Modifies browser DLL files to change browser settings and disable security features.

18
New cards

Hping3

Tool similar to ping but more advanced; it can bypass the firewall filter and use TCP, UDP, ICMP and RAW-IP protocols. It also has a traceroute mode.

19
New cards

NMAP

Uses raw IP packets in novel ways to determine which hosts are available on the network, what services those hosts are offering, which operating systems they are running, and what type of packet filters/firewalls are in use.

20
New cards

dnsenum

Helps to get MX, A, and other records connect to a domain. Multithreaded perl script to enumerate DNS information of a domain.

21
New cards

TLSSLed

Linux shell script used to evaluate the security of a target SSL/TLS (HTTPS) web server implementation.

22
New cards

Dmitry

Performs a whois lookup on the IP address or domain name of a host. It also searches for possible subdomains a UNIX/(GNU)Linux Command Line program coded purely in C with the ability to gather as much information as possible about a host.

23
New cards

pof

Tool that can identify the operating system of a target host simply by packet firewall.

24
New cards

BED

Program designed to check daemons for potential buffer overflows, format strings, et. al.

25
New cards

Burpsuite

Can be used as a sniffing tool between your browser and the web servers to find the parameters that the web application uses. A web proxy server operates as a man-in-the-middle between your browser and destination web servers to intercept, inspect, and modify traffic.

26
New cards

ZapProxy

A free, open-source penetration testing tool functions as a man-in-the-middle proxy between the tester's browser and the web application so that it can intercept and inspect messages sent between browser and web application, modify the contents if needed, and then forward those packets on to the destination.

27
New cards

Sqlmap

Automates the process of detecting and exploiting SQL injection flaws and taking over of database servers.

28
New cards

Wireshark

The world's foremost network protocol analyzer. It lets you see what's happening on your network at a microscopic level.

29
New cards

ddrescue

Copies data from one file or block device (hard disc, cdrom, etc.) to another, trying to rescue the good parts first in case of read errors.

30
New cards

pdf-parser

Parses a PDF document to identify the fundamental elements used in the analyzed pdf file. Generally, this is used for pdf files that you suspect has a script embedded in it.

31
New cards

Dradis framework

A reporting tool used by information security professionals specially during security assessments. It is a self-contained web application that provides a centralized repository of information to keep track of what has been done so far, and what is still ahead.