CSC438 section1

0.0(0)
Studied by 0 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/117

encourage image

There's no tags or description

Looks like no tags are added yet.

Last updated 4:23 PM on 2/12/26
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

118 Terms

1
New cards

What is a buffer overflow attack?

A type of attack where excess data overflows into adjacent memory, potentially allowing attackers to execute arbitrary code.

<p>A type of attack where excess data overflows into adjacent memory, potentially allowing attackers to execute arbitrary code.</p>
2
New cards

What does building automation system refer to?

A system that controls and monitors building systems such as HVAC, lighting, and security.

3
New cards

What is a controller area network (CAN) bus?

A robust vehicle bus standard designed to facilitate communication among various microcontrollers without a host computer.

4
New cards

What is credential stuffing?

An attack method where stolen account credentials are used to gain unauthorized access to user accounts through automated login requests.

5
New cards

What does cross-site scripting (XSS) entail?

A security vulnerability that allows attackers to inject malicious scripts into content from otherwise trusted websites.

<p>A security vulnerability that allows attackers to inject malicious scripts into content from otherwise trusted websites.</p>
6
New cards

What is directory traversal?

An attack that allows unauthorized access to files and directories stored outside the web document root.

7
New cards

What is a drone in the context of cybersecurity?

An unmanned aerial vehicle that can be exploited for various purposes, including surveillance and data collection.

<p>An unmanned aerial vehicle that can be exploited for various purposes, including surveillance and data collection.</p>
8
New cards

What is an embedded system?

A computer system with a dedicated function within a larger mechanical or electrical system.

9
New cards

What is an eXtensible Markup Language (XML) attack?

An attack that exploits vulnerabilities in XML processing to manipulate or corrupt data.

10
New cards

What is a field-programmable gate array (FPGA)?

An integrated circuit that can be configured by the customer or designer after manufacturing.

<p>An integrated circuit that can be configured by the customer or designer after manufacturing.</p>
11
New cards

What is a heap overflow?

A type of buffer overflow that occurs in the heap memory area, potentially allowing code execution.

12
New cards

What does impersonation refer to in cybersecurity?

The act of pretending to be another user or device to gain unauthorized access or information.

13
New cards

What is an industrial control system (ICS)?

A system used to control industrial processes such as manufacturing, production, and power generation.

14
New cards

What is an integer overflow attack?

An attack that occurs when an arithmetic operation attempts to create a numeric value that is too high to be represented within the allocated space.

15
New cards

What does Internet of Things (IoT) refer to?

The network of physical devices connected to the internet, enabling them to collect and exchange data.

16
New cards

What is a man-in-the-middle (MITM) attack?

An attack where the attacker secretly intercepts and relays messages between two parties who believe they are directly communicating with each other.

17
New cards

What is Modbus?

A communication protocol used for transmitting information over serial lines between electronic devices.

18
New cards

What is a password spraying attack?

An attack method where a small number of commonly used passwords are tried against many accounts.

19
New cards

What is Persistent XSS?

A type of cross-site scripting attack where the injected script is permanently stored on the target server.

20
New cards

What does physical access control entail?

Measures taken to restrict physical access to facilities, equipment, and resources.

21
New cards

What is privilege escalation?

An exploit that allows an attacker to gain elevated access to resources that are normally protected from an application or user.

22
New cards

What is a real-time operating system (RTOS)?

An operating system that guarantees a certain capability within a specified time constraint.

23
New cards

What is Reflected XSS?

A type of cross-site scripting attack where the injected script is reflected off a web server.

24
New cards

What is remote code execution (RCE)?

A vulnerability that allows an attacker to execute arbitrary code on a remote machine.

25
New cards

What is a rootkit?

A collection of software tools that enable unauthorized access to a computer or network while hiding its presence.

26
New cards

What is session hijacking?

An attack where an attacker takes control of a user's session after they have authenticated.

27
New cards

What is Structured Query Language (SQL) injection?

An attack that allows an attacker to execute arbitrary SQL code on a database by injecting malicious SQL statements.

28
New cards

What does supervisory control and data acquisition (SCADA) refer to?

A system used for controlling industrial processes and infrastructure.

29
New cards

What is a system on a chip (SoC)?

An integrated circuit that consolidates all components of a computer or other electronic system onto a single chip.

30
New cards

What are workflow and process automation systems?

Systems designed to automate complex business processes and functions beyond conventional automation.

31
New cards

What is the focus of Module 1 in the CompTIA CySA+ Guide?

Enterprise Threats and Vulnerabilities

32
New cards

What are the objectives of the module?

Identify different types of common attacks, describe risks associated with mobile devices, and explain security issues of embedded and specialized devices.

33
New cards

What are some types of cyberattacks mentioned?

Attacks using malware, memory vulnerability attacks, web server application attacks, session hijacking, attacks on credentials, exploitation and penetration attacks, and social engineering attacks.

34
New cards

Define malware.

Malicious software designed to harm or exploit a device, service, or network, entering a system without user consent.

35
New cards

In which areas of memory can a buffer overflow attack occur?

In both the heap and stack areas.

36
New cards

What is cross-site scripting (XSS)?

An attack using scripting that originates on one site to impact another site, essentially a client-side code injection attack.

37
New cards

What is Document Object Model (DOM) XSS?

An XSS attack where a web application writes data to the DOM without proper sanitization, allowing attackers to manipulate the data.

38
New cards

What is the total number of malware instances currently in existence?

Exceeds 1.2 billion instances.

39
New cards

What are the components of a process in memory?

Text, data, stack (local variables), and heap (dynamic memory).

40
New cards

What can modify the stack pointer or heap pointer in a buffer overflow attack?

Malicious software memory location.

41
New cards

What is the role of a process control block (PCB) in memory vulnerability attacks?

It can be modified to point to malicious software memory locations.

42
New cards

What is the purpose of the icebreaker activity in the class?

To discuss various types of cyberattacks and personal safety measures against them.

43
New cards

What is a session hijacking attack?

An attack where an attacker takes control of a user's session after they have logged in.

44
New cards

What are social engineering attacks?

Attacks that manipulate individuals into divulging confidential information.

45
New cards

What is the significance of identifying common attacks in cybersecurity?

It helps in understanding risks and implementing effective security measures.

46
New cards

What is the consequence of a successful malware attack?

It can lead to unauthorized access, data theft, and system damage.

47
New cards

What is the main risk associated with mobile devices?

They can be easily lost or stolen, leading to potential data breaches.

48
New cards

What is the importance of sanitization in web applications?

It prevents XSS and other injection attacks by ensuring user input is properly handled.

49
New cards

What is the goal of penetration attacks?

To exploit vulnerabilities in a system to gain unauthorized access.

50
New cards

How can organizations protect against social engineering attacks?

By training employees to recognize and respond to such threats.

51
New cards

What is the impact of memory vulnerabilities on software security?

They can lead to exploitation and unauthorized access to sensitive data.

52
New cards

What is the role of user input in web server application attacks?

Threat actors exploit user input to execute attacks like XSS.

53
New cards

What is a threat actor's capability when controlling a script executed in a victim's browser through XSS?

They could fully compromise that user.

54
New cards

What can an attacker do when they have control over a victim's session through XSS?

Initiate interactions with other application users, modify information, perform any action the user can, and view any information the user can.

55
New cards

What is SQL injection?

An attack that targets SQL servers by introducing commands into the server to retrieve confidential information.

56
New cards

What is the intent of SQL injection attacks?

To retrieve confidential information from the database, not to inject malicious code.

57
New cards

How can an attacker verify if an email address exists using SQL injection?

By entering an email in a field and observing the server's response; a specific message indicates whether the email is verified.

58
New cards

What is an XML injection attack?

An attack on NoSQL databases that use XML for data manipulation, which can occur if input is not sanitized.

59
New cards

What is a session ID?

A unique value assigned by a web server to a specific user for the duration of their visit.

60
New cards

What is one method used for hijacking a session?

Intercepting the session ID through XSS or a man-in-the-middle (MITM) attack.

61
New cards

Why is password spraying less likely to raise alarms?

Because it uses common passwords, which may not trigger account lockouts.

62
New cards

Why does credential stuffing have a higher probability of success than password spraying?

Because it leverages a large number of stolen passwords and users often reuse passwords across multiple accounts.

63
New cards

What is the first step threat actors take in exploitation and penetration tactics?

Conduct reconnaissance against systems to look for vulnerabilities.

64
New cards

What do threat actors do after gaining advanced privileges?

They tunnel through the network to access additional systems and may use directory traversal attacks.

65
New cards

What is a backdoor in cybersecurity?

A method installed by attackers to maintain long-term access to a compromised system.

66
New cards

What is social engineering?

A method of gathering data by exploiting the weaknesses of individuals.

67
New cards

What is social engineering impersonation?

Masquerading as a real or fictitious character to fool victims, also known as identity fraud.

68
New cards

What is the goal of pretexting in social engineering?

To obtain private information by impersonating someone else.

69
New cards

Which attack takes advantage of user input?

Cross-site scripting attack.

70
New cards

What is a cross-site scripting (XSS) attack?

An attack using scripting that originates on one site to impact another site.

71
New cards

Give an example of an embedded system.

Central heating system, GPS system, fitness tracker, medical devices.

72
New cards

What are the categories of embedded and specialized devices?

Hardware and software, industrial systems, campus systems, IoT devices, specialized systems.

73
New cards

What is a Raspberry Pi?

A low-cost, credit card-sized computer motherboard.

74
New cards

What is an Arduino?

A controller designed for other devices, with less power compared to Raspberry Pi.

75
New cards

What do industrial control systems (ICSs) manage?

Devices locally or remotely by collecting, monitoring, and processing real-time data.

76
New cards

What is a supervisory control and data acquisition (SCADA) system?

A system that manages multiple ICSs to maintain efficiency and reduce downtime.

77
New cards

What common protocol do many SCADA systems use?

Modbus for transmitting information between devices.

78
New cards

What is a building automation system?

A system that manages building elements, including physical access control systems.

79
New cards

What is an example of an IoT device?

Smartwatch, fitness devices, coffee makers, or keyless entry systems.

80
New cards

What are the security constraints for embedded systems?

Power limitations, low processing capabilities, lack of advanced network security features, and inability to patch vulnerabilities.

81
New cards

Why do embedded systems have low power requirements?

To prolong battery life, which limits their ability to perform strong security measures.

82
New cards

What is the impact of low compute capabilities on embedded systems?

It restricts the implementation of complex and comprehensive security measures.

83
New cards

What is a common use of IoT devices?

Home automation items like thermostats, coffee makers, and washing machines.

84
New cards

What is the role of workflow and process automation systems in a campus?

To interconnect various elements for centralized and automatic monitoring and control.

85
New cards

What is a common example of a specialized system in automobiles?

Controller area network (CAN) bus.

<p>Controller area network (CAN) bus.</p>
86
New cards

What is the purpose of a building automation system?

To manage building elements, including access control and environmental systems.

87
New cards

What is the significance of real-time operating systems (RTOS) in SoC?

They are specifically designed for embedded or specialized systems.

88
New cards

What is an example of a specialized system?

Drones or specific industrial control systems.

89
New cards

What is the primary function of industrial control systems?

To control devices such as valves, pumps, and motors without human intervention.

90
New cards

What is a common feature of modern campuses?

The use of workflow and process automation systems.

91
New cards

What is the main challenge regarding cryptography in embedded systems?

Encryption and decryption require significant processing and storage capacities that these devices lack.

92
New cards

What is the role of IoT devices in everyday life?

To enhance convenience and automation in tasks such as home management.

93
New cards

What is a common security constraint for embedded systems?

Lack of authentication features.

94
New cards

Why do many devices operate on an 'implied trust' basis?

They are designed without security features, assuming all other devices or users can be trusted.

95
New cards

What are weak defaults in device security?

Common usernames and passwords like 'admin', '123456', or 'password' that are easy to guess.

96
New cards

What does the Internet of Things (IoT) Cybersecurity Improvement Act of 2019 require?

Connected devices must have reasonable security features appropriate for their function and the information they handle.

97
New cards

What are the four categories of mobile devices?

Tablets, smartphones, portable computers, and wearables.

98
New cards

What is a significant risk associated with mobile devices?

Device vulnerabilities, connection vulnerabilities, and accessing untrusted content.

99
New cards

What is a major physical security concern for mobile devices?

They are frequently lost or stolen, risking data retrieval by thieves.

100
New cards

How long does Apple provide Over The Air (OTA) updates for iOS devices?

At least four years.

Explore top flashcards

flashcards
CĂ´ Yáşżn 5/12/2024
22
Updated 480d ago
0.0(0)
flashcards
EXAM 2 - part 6
22
Updated 250d ago
0.0(0)
flashcards
Einheit 1 Freunde
75
Updated 229d ago
0.0(0)
flashcards
Biology Honors Evolution
51
Updated 1096d ago
0.0(0)
flashcards
Matiekos egzas
73
Updated 819d ago
0.0(0)
flashcards
Livy 2.10 Vocab
20
Updated 1215d ago
0.0(0)
flashcards
CĂ´ Yáşżn 5/12/2024
22
Updated 480d ago
0.0(0)
flashcards
EXAM 2 - part 6
22
Updated 250d ago
0.0(0)
flashcards
Einheit 1 Freunde
75
Updated 229d ago
0.0(0)
flashcards
Biology Honors Evolution
51
Updated 1096d ago
0.0(0)
flashcards
Matiekos egzas
73
Updated 819d ago
0.0(0)
flashcards
Livy 2.10 Vocab
20
Updated 1215d ago
0.0(0)