Computer Security Final

0.0(0)
Studied by 0 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/146

encourage image

There's no tags or description

Looks like no tags are added yet.

Last updated 10:19 AM on 5/13/26
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

147 Terms

1
New cards

SOFTWARE SECURITY FLASHCARDS

SOFTWARE SECURITY FLASHCARDS

2
New cards

What are the five critical OWASP-related software flaws?

  • Unvalidated input

  • Cross-site scripting (XSS)

  • Buffer overflow

  • Injection flaws

  • Improper error handling

3
New cards

What is defensive programming?

Programming style that assumes all input and environments are dangerous and validates everything before use.

4
New cards

What is security by design?

Building software securely from the beginning instead of adding security later.

5
New cards

What is whitelist validation?

Only accepting known safe input values or formats.

6
New cards

What is blacklist validation?

Rejecting known dangerous input patterns or characters.

7
New cards

Why is whitelist validation safer than blacklist validation?

Because attackers may bypass blacklists with unexpected inputs, while whitelists only allow approved data.

8
New cards

Why are blacklists weaker than whitelists?

Attackers can bypass blacklists using unexpected variations.

9
New cards

What is fuzzing?

Testing software with random or malformed inputs to discover vulnerabilities.

10
New cards

What is a buffer overflow?

When input exceeds allocated buffer size and overwrites adjacent memory.

11
New cards

Where can a vulnerable buffer exist?

On the stack, heap, or data section.

12
New cards

What can a buffer overflow overwrite?

Variables, return addresses, or control flow data.

13
New cards

What are possible consequences of a buffer overflow?

Crashes, corrupted data, or attacker-controlled code execution.

14
New cards

What is stack smashing?

Overwriting stack memory including return addresses.

15
New cards

Why are C and C++ more vulnerable to buffer overflows?

They allow direct memory access with limited bounds checking.

16
New cards

Why may testing fail to detect a buffer overflow?

Normal test inputs may not be large enough to trigger the overflow.

17
New cards

Why are adversarial inputs important in security testing?

Attackers intentionally craft malicious input unlike normal users.

18
New cards

What is an injection attack?

An attack where malicious input changes program execution flow.

19
New cards

What is XSS?

An attack where malicious script code is injected into web content viewed by another user.

20
New cards

What does XSS exploit?

The browser’s trust of content coming from the same website.

21
New cards

What is a memory leak?

Failure to release dynamically allocated memory, eventually exhausting heap memory.

22
New cards

Why are strongly typed languages generally safer?

Because they restrict unsafe interpretation of data.

23
New cards

What is the “Roll Your Own” fallacy?

Creating custom cryptography instead of using trusted libraries usually introduces vulnerabilities.

24
New cards

What is the Golden Rule of Crypto?

Do NOT roll your own cryptography.

25
New cards

What is the API assumption gap?

Crypto libraries assume programmers use APIs correctly; misuse can break security even if the math is strong.

26
New cards

What is safe coding?

Treating all external input as dangerous and validating before use.

27
New cards

What is input validation?

Checking data size, type, format, and range before processing.

28
New cards

DOS ATTACK FLASHCARDS

DOS ATTACK FLASHCARDS

29
New cards

What is a Denial-of-Service (DoS) attack?

An attack that prevents legitimate users from accessing systems/resources.

30
New cards

What resources do DoS attacks commonly exhaust?

CPU, memory, bandwidth, and disk space.

31
New cards

What is source address spoofing?

Forging the source IP address to hide attacker identity.

32
New cards

Why is spoofing useful in DoS attacks?

It makes tracing the attacker more difficult.

33
New cards

What is a SYN flood attack?

A DoS attack that fills a server’s half-open TCP connection table.

34
New cards

How does SYN flooding work?

Attacker sends many SYN packets without completing the handshake.

35
New cards

What is the TCP three-way handshake?

SYN → SYN-ACK → ACK.

36
New cards

Why does SYN flooding deny service?

The server wastes resources waiting for ACK responses that never arrive.

37
New cards

What are the three categories of DoS attacks?

Volumetric, protocol, and application-layer attacks.

38
New cards

What does a volumetric attack target?

Network bandwidth.

39
New cards

What does a protocol attack target?

Network devices/state tables.

40
New cards

What does an application-layer attack target?

Server resources like CPU/RAM.

41
New cards

INTRUSION DETECTION FLASHCARDS

INTRUSION DETECTION FLASHCARDS

42
New cards

What is an intrusion?

Unauthorized access or malicious activity on a system.

43
New cards

What is an IDS?

Intrusion Detection System that monitors systems/networks for attacks.

44
New cards

What are the main classes of intruders?

Cyber criminals, hacktivists, state-sponsored attackers, hobbyists/crackers.

45
New cards

What is an APT?

Advanced Persistent Threat; long-term targeted attack usually by nation-state actors.

46
New cards

What is reconnaissance?

Gathering information about a target before attacking.

47
New cards

What tools are commonly used in reconnaissance?

whois, nslookup, dig, nmap.

48
New cards

What is privilege escalation?

Gaining higher-level permissions after initial access.

49
New cards

What is spear phishing?

Targeted phishing attack aimed at specific individuals.

50
New cards

What is lateral movement?

Moving through additional systems after initial compromise.

51
New cards

What is a rootkit?

Software used to hide malicious activity and maintain access.

52
New cards

What does “covering tracks” mean?

Deleting logs/history to hide evidence of intrusion.

53
New cards

FIREWALL FLASHCARDS

FIREWALL FLASHCARDS

54
New cards

What is a firewall?

A security system that filters traffic between networks.

55
New cards

Why are firewalls used?

To create a controlled link between trusted and untrusted networks.

56
New cards

What is a choke point?

A single monitored location where traffic passes through.

57
New cards

What is a firewall access policy?

Rules defining what traffic is allowed or denied.

58
New cards

What characteristics can firewalls filter on?

IP address, protocol, application, user identity, network activity.

59
New cards

What is packet filtering?

Filtering traffic using IP addresses, ports, and protocols.

60
New cards

What is stateful inspection?

Tracking active connections and filtering based on connection state.

61
New cards

What is an application-level gateway?

Firewall that filters traffic at the application layer.

62
New cards

What are firewall limitations?

Cannot stop attacks that bypass the firewall or insider threats.

63
New cards

REGULAR EXPRESSION FLASHCARDS

REGULAR EXPRESSION FLASHCARDS

64
New cards

What does the “.” regex operator mean?

Matches any single character.

65
New cards

What does “|” mean in regex?

OR operator.

66
New cards

What does “^” mean in regex?

Beginning of a line.

67
New cards

What does “$” mean in regex?

End of a line.

68
New cards

What do square brackets [] mean in regex?

Character class matching any character inside brackets.

69
New cards

What does “*” mean in regex?

0 or more repetitions.

70
New cards

What does “+” mean in regex?

1 or more repetitions.

71
New cards

What does “?” mean in regex?

0 or 1 occurrence.

72
New cards

SYMMETRIC ENCRYPTION FLASHCARDS

SYMMETRIC ENCRYPTION FLASHCARDS

73
New cards

What are the five ingredients of symmetric encryption?

  • Plaintext

  • Encryption algorithm

  • Secret key

  • Ciphertext

  • Decryption algorithm

74
New cards

Difference between substitution and transposition?

  • Substitution replaces elements

  • Transposition rearranges elements

75
New cards

Difference between block cipher and stream cipher?

  • Block cipher encrypts fixed-size blocks

  • Stream cipher encrypts continuously one element at a time

76
New cards

What is a ciphertext-only attack?

Attacker only has ciphertext and encryption algorithm.

77
New cards

What is a known-plaintext attack?

Attacker has plaintext-ciphertext pairs.

78
New cards

What is a chosen-plaintext attack?

Attacker chooses plaintext and obtains corresponding ciphertext.

79
New cards

What is a chosen-ciphertext attack?

Attacker chooses ciphertext and obtains decrypted plaintext.

80
New cards

What is computational security?

Breaking encryption costs more time/resources than the value or lifetime of the data.

81
New cards

What is a Feistel network?

A block cipher structure using repeated rounds of substitutions and permutations.

82
New cards

What replaced DES?

AES replaced DES in 2001.

83
New cards

Why is ECB insecure?

Identical plaintext blocks produce identical ciphertext blocks.

84
New cards

What does CBC mode do?

XORs each plaintext block with previous ciphertext block before encryption.

85
New cards

What is CTR mode?

Encrypts a counter value and XORs it with plaintext.

86
New cards

What is symmetric encryption also called?

Secret-key or conventional encryption.

87
New cards

What is asymmetric encryption?

Encryption using public/private key pairs.

88
New cards

What is the main weakness of symmetric encryption?

Secure key distribution.

89
New cards

What is substitution in cryptography?

Replacing plaintext elements with different elements.

90
New cards

What is transposition in cryptography?

Rearranging plaintext elements.

91
New cards

Why is AES preferred over DES?

AES is stronger and more efficient.

92
New cards

Why are stream ciphers fast?

They process data continuously instead of block-by-block.

93
New cards

AES FLASHCARDS

AES FLASHCARDS

94
New cards

Main AES round operations?

  • SubBytes

  • ShiftRows

  • MixColumns

  • AddRoundKey

95
New cards

What does SubBytes do in AES?

Performs byte substitution using an S-box.

96
New cards

What property does SubBytes provide?

Confusion.

97
New cards

What does ShiftRows do?

Rotates rows to spread bytes across columns.

98
New cards

What does MixColumns do?

Mixes bytes within each column for diffusion.

99
New cards

What does AddRoundKey do?

XORs state with expanded key material.

100
New cards

What are AES S-boxes used for?

Nonlinear byte substitution.