Lecture 6 Disributed

5.0(1)
studied byStudied by 38 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/55

flashcard set

Earn XP

Description and Tags

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

56 Terms

1
New cards

Security Model

A framework or system that defines the security requirements, threats, and controls for a particular system or network.

2
New cards

Breached records

Records or data that have been accessed or obtained by unauthorized individuals or entities.

3
New cards

Hacker attack

An unauthorized attempt to gain access to a computer system or network.

4
New cards

Cyber attacks

Malicious activities or actions carried out by individuals or groups to compromise the security of computer systems or networks.

5
New cards

Data breach

The unauthorized access, acquisition, or disclosure of sensitive or confidential data.

6
New cards

Malware

Malicious software designed to disrupt, damage, or gain unauthorized access to computer systems or networks.

7
New cards

Distributed Denial of Service (DDOS) attacks

where multiple compromised computers are used to flood a target system or network with traffic, causing it to become unavailable.

8
New cards

Human error

Mistakes or actions made by individuals that lead to security breaches or vulnerabilities.

9
New cards

Cybersecurity breaches

Unauthorized access or compromise of computer systems or networks, resulting in potential harm or loss.

10
New cards

Security policies

Guidelines or rules that define the acceptable use and access of resources within an organization.

11
New cards

Security mechanisms

Tools, technologies, or procedures used to enforce security policies and protect resources.

12
New cards

Cryptography

The practice of secure communication by converting information into a code or cipher to prevent unauthorized access or tampering.

13
New cards

Security attacks

Various forms of malicious activities or actions that aim to compromise the security of a system or network.

14
New cards

Secure channels

Communication channels that ensure privacy, data integrity, and protection against tampering or unauthorized access.

15
New cards

Threats

Potential risks or vulnerabilities that can be exploited to compromise the security of a system or network.

16
New cards

Attacks

Specific actions or techniques used to exploit vulnerabilities and compromise the security of a system or network.

17
New cards

Eavesdropping

Unauthorized interception or monitoring of private or secret information.

18
New cards

Masquerading

Impersonating or assuming the identity of another user or principal without their authority.

19
New cards

Message tampering

Altering the content of messages in transit, often done through man-inthe-middle attacks.

20
New cards

Denial of service

Flooding a system or network with excessive traffic or requests to disrupt its normal operation and deny access to legitimate users.

21
New cards

Trojan horses and viruses

Malicious software or code that can enter a computer system and cause harm or unauthorized actions.

22
New cards

IP spoofing

Creating IP packets with a false source IP address to deceive or bypass security measures.

23
New cards

Securing electronic transactions

Implementing measures and protocols to ensure the confidentiality and integrity of email, online purchases, and banking transactions.

24
New cards

Authenticate

Verify the identity of someone or something.

25
New cards

Identity

The unique characteristics or attributes that distinguish an individual or entity.

26
New cards

Interfaces

Points of interaction or communication between different components or systems.

27
New cards

Networks

A group of interconnected devices or systems.

28
New cards

Keys

A parameter used in encryption algorithms to encrypt or decrypt messages.

29
New cards

Hackers

Individuals who gain unauthorized access to computer systems or networks.

30
New cards

Computer security

The protection of computer systems and data from unauthorized access or attacks.

31
New cards

Shared Secret Keys

Keys that are known and shared between the sender and recipient.

32
New cards

Public/Private Key Pair

A pair of keys, used for encryption and decryption.

33
New cards

Authentication

The process of verifying the identity of someone or something.

34
New cards

Digital Signatures

A cryptographic technique used to verify the authenticity and integrity of digital messages.

35
New cards

Secret key

A key used in encryption algorithms that must be kept confidential.

36
New cards

Private key

A key known only to a specific individual or entity.

37
New cards

Public key

A key that is publicly available and used for encryption or verification.

38
New cards

Message encryption

The process of encoding a message to hide its contents.

39
New cards

Message decryption

The process of decoding an encrypted message to reveal its contents.

40
New cards

Public Key Cryptosystem

A cryptographic system that uses public and private keys for encryption and decryption.

41
New cards

Server

A computer or system that provides services or resources to other computers or systems.

42
New cards

Tampering

Unauthorized alteration or modification of data or messages.

43
New cards

Certificate

A digital document that verifies the authenticity and integrity of information.

44
New cards

Trusted authority

An entity that is trusted to issue and verify certificates.

45
New cards

Signature

A unique identifier or mark that verifies the authenticity of a document or message.

46
New cards

Symmetric (secret key)

A cryptographic algorithm that uses the same key for both encryption and decryption.

47
New cards

Asymmetric (public key)

A cryptographic algorithm that uses separate encryption and decryption keys.

48
New cards

Brute-force

A form of attack where all possible key values are tried to decrypt a known pair of message and ciphertext.

49
New cards

Hybrid protocols

Cryptographic protocols that combine symmetric and asymmetric encryption methods.

50
New cards

Public Key Infrastructure (PKI)

A system that allows users to verify the authenticity of public keys.

51
New cards

X.509 certificate

A digital certificate that contains information about the owner of a public key.

52
New cards

Certificate Authorities (CAs)

Trusted entities that issue and verify digital certificates.

53
New cards

RSA

A widely used asymmetric encryption algorithm created by Ron Rivest, Adi Shamir, and Leonard Adleman.

54
New cards

Generating Keys

The process of selecting prime numbers and calculating the public and private keys for RSA encryption.

55
New cards

Encryption

The process of converting plaintext into ciphertext using a cryptographic algorithm and a key.

56
New cards

Decryption

The process of converting ciphertext back into plaintext using a cryptographic algorithm and a key.