Lecture 6 Disributed

studied byStudied by 38 people
5.0(1)
Get a hint
Hint

Security Model

1 / 55

flashcard set

Earn XP

Description and Tags

56 Terms

1

Security Model

A framework or system that defines the security requirements, threats, and controls for a particular system or network.

New cards
2

Breached records

Records or data that have been accessed or obtained by unauthorized individuals or entities.

New cards
3

Hacker attack

An unauthorized attempt to gain access to a computer system or network.

New cards
4

Cyber attacks

Malicious activities or actions carried out by individuals or groups to compromise the security of computer systems or networks.

New cards
5

Data breach

The unauthorized access, acquisition, or disclosure of sensitive or confidential data.

New cards
6

Malware

Malicious software designed to disrupt, damage, or gain unauthorized access to computer systems or networks.

New cards
7

Distributed Denial of Service (DDOS) attacks

where multiple compromised computers are used to flood a target system or network with traffic, causing it to become unavailable.

New cards
8

Human error

Mistakes or actions made by individuals that lead to security breaches or vulnerabilities.

New cards
9

Cybersecurity breaches

Unauthorized access or compromise of computer systems or networks, resulting in potential harm or loss.

New cards
10

Security policies

Guidelines or rules that define the acceptable use and access of resources within an organization.

New cards
11

Security mechanisms

Tools, technologies, or procedures used to enforce security policies and protect resources.

New cards
12

Cryptography

The practice of secure communication by converting information into a code or cipher to prevent unauthorized access or tampering.

New cards
13

Security attacks

Various forms of malicious activities or actions that aim to compromise the security of a system or network.

New cards
14

Secure channels

Communication channels that ensure privacy, data integrity, and protection against tampering or unauthorized access.

New cards
15

Threats

Potential risks or vulnerabilities that can be exploited to compromise the security of a system or network.

New cards
16

Attacks

Specific actions or techniques used to exploit vulnerabilities and compromise the security of a system or network.

New cards
17

Eavesdropping

Unauthorized interception or monitoring of private or secret information.

New cards
18

Masquerading

Impersonating or assuming the identity of another user or principal without their authority.

New cards
19

Message tampering

Altering the content of messages in transit, often done through man-inthe-middle attacks.

New cards
20

Denial of service

Flooding a system or network with excessive traffic or requests to disrupt its normal operation and deny access to legitimate users.

New cards
21

Trojan horses and viruses

Malicious software or code that can enter a computer system and cause harm or unauthorized actions.

New cards
22

IP spoofing

Creating IP packets with a false source IP address to deceive or bypass security measures.

New cards
23

Securing electronic transactions

Implementing measures and protocols to ensure the confidentiality and integrity of email, online purchases, and banking transactions.

New cards
24

Authenticate

Verify the identity of someone or something.

New cards
25

Identity

The unique characteristics or attributes that distinguish an individual or entity.

New cards
26

Interfaces

Points of interaction or communication between different components or systems.

New cards
27

Networks

A group of interconnected devices or systems.

New cards
28

Keys

A parameter used in encryption algorithms to encrypt or decrypt messages.

New cards
29

Hackers

Individuals who gain unauthorized access to computer systems or networks.

New cards
30

Computer security

The protection of computer systems and data from unauthorized access or attacks.

New cards
31

Shared Secret Keys

Keys that are known and shared between the sender and recipient.

New cards
32

Public/Private Key Pair

A pair of keys, used for encryption and decryption.

New cards
33

Authentication

The process of verifying the identity of someone or something.

New cards
34

Digital Signatures

A cryptographic technique used to verify the authenticity and integrity of digital messages.

New cards
35

Secret key

A key used in encryption algorithms that must be kept confidential.

New cards
36

Private key

A key known only to a specific individual or entity.

New cards
37

Public key

A key that is publicly available and used for encryption or verification.

New cards
38

Message encryption

The process of encoding a message to hide its contents.

New cards
39

Message decryption

The process of decoding an encrypted message to reveal its contents.

New cards
40

Public Key Cryptosystem

A cryptographic system that uses public and private keys for encryption and decryption.

New cards
41

Server

A computer or system that provides services or resources to other computers or systems.

New cards
42

Tampering

Unauthorized alteration or modification of data or messages.

New cards
43

Certificate

A digital document that verifies the authenticity and integrity of information.

New cards
44

Trusted authority

An entity that is trusted to issue and verify certificates.

New cards
45

Signature

A unique identifier or mark that verifies the authenticity of a document or message.

New cards
46

Symmetric (secret key)

A cryptographic algorithm that uses the same key for both encryption and decryption.

New cards
47

Asymmetric (public key)

A cryptographic algorithm that uses separate encryption and decryption keys.

New cards
48

Brute-force

A form of attack where all possible key values are tried to decrypt a known pair of message and ciphertext.

New cards
49

Hybrid protocols

Cryptographic protocols that combine symmetric and asymmetric encryption methods.

New cards
50

Public Key Infrastructure (PKI)

A system that allows users to verify the authenticity of public keys.

New cards
51

X.509 certificate

A digital certificate that contains information about the owner of a public key.

New cards
52

Certificate Authorities (CAs)

Trusted entities that issue and verify digital certificates.

New cards
53

RSA

A widely used asymmetric encryption algorithm created by Ron Rivest, Adi Shamir, and Leonard Adleman.

New cards
54

Generating Keys

The process of selecting prime numbers and calculating the public and private keys for RSA encryption.

New cards
55

Encryption

The process of converting plaintext into ciphertext using a cryptographic algorithm and a key.

New cards
56

Decryption

The process of converting ciphertext back into plaintext using a cryptographic algorithm and a key.

New cards

Explore top notes

note Note
studied byStudied by 51 people
Updated ... ago
5.0 Stars(1)
note Note
studied byStudied by 4 people
Updated ... ago
5.0 Stars(2)
note Note
studied byStudied by 9 people
Updated ... ago
5.0 Stars(1)
note Note
studied byStudied by 12 people
Updated ... ago
5.0 Stars(1)
note Note
studied byStudied by 17 people
Updated ... ago
5.0 Stars(2)
note Note
studied byStudied by 53 people
Updated ... ago
5.0 Stars(1)
note Note
studied byStudied by 24 people
Updated ... ago
4.3 Stars(3)
note Note
studied byStudied by 38587 people
Updated ... ago
4.8 Stars(311)

Explore top flashcards

flashcards Flashcard76 terms
studied byStudied by 2 people
Updated ... ago
5.0 Stars(1)
flashcards Flashcard37 terms
studied byStudied by 32 people
Updated ... ago
5.0 Stars(1)
flashcards Flashcard20 terms
studied byStudied by 13 people
Updated ... ago
4.7 Stars(3)
flashcards Flashcard81 terms
studied byStudied by 32 people
Updated ... ago
4.7 Stars(3)
flashcards Flashcard111 terms
studied byStudied by 5 people
Updated ... ago
5.0 Stars(1)
flashcards Flashcard58 terms
studied byStudied by 1 person
Updated ... ago
5.0 Stars(1)
flashcards Flashcard74 terms
studied byStudied by 6 people
Updated ... ago
5.0 Stars(1)
flashcards Flashcard126 terms
studied byStudied by 1157 people
Updated ... ago
4.8 Stars(9)