penis

0.0(0)
Studied by 0 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/277

encourage image

There's no tags or description

Looks like no tags are added yet.

Last updated 9:38 PM on 5/7/26
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

278 Terms

1
New cards

CIA Triad

The three foundational goals of information security — Confidentiality, Integrity, and Availability.

2
New cards

Confidentiality

Information is only accessible to authorized parties (e.g., encryption, access controls).

3
New cards

Integrity

Information is accurate and unaltered by unauthorized parties (e.g., hashing, checksums, digital signatures).

4
New cards

Availability

Information and systems are accessible when needed (e.g., redundancy, backups, DDoS protection).

5
New cards

Authenticity

Extension of CIA — verifying that data/users are genuine.

6
New cards

Non-repudiation

Extension of CIA — ensuring an action cannot be denied by the party that performed it.

7
New cards

PI (Personal Information)

Any information about a person; the broadest category. Examples: name, job title, employer, general location.

8
New cards

PII (Personally Identifiable Information)

Information that can identify a specific individual, alone or combined. Examples: SSN, driver’s license #, passport #, full name + DOB, biometrics.

9
New cards

PPI (Protected/Personal Private Information)

Sensitive information requiring special protection, often regulated. Examples: medical records (PHI), financial account numbers, login credentials.

10
New cards

Threat

A potential cause of harm (e.g., a hacker, malware).

11
New cards

Vulnerability

A weakness that can be exploited (e.g., unpatched software).

12
New cards

Risk

The likelihood and impact of a threat exploiting a vulnerability. Risk = Threat × Vulnerability × Impact.

13
New cards

Exploit

Code or technique used to take advantage of a vulnerability.

14
New cards

Attack Surface

All the points where an attacker could attempt to enter a system.

15
New cards

Attack Vector

The specific method or path used in an attack (email, USB, network).

16
New cards

Asset

Something of value being protected (data, systems, people).

17
New cards

Control / Countermeasure

A safeguard that reduces risk.

18
New cards

Hashing

A one-way function that converts input into a fixed-length output (digest); cannot be reversed. Used for integrity checks and password storage.

19
New cards

Hash digest

The fixed-length output produced by a hash function.

20
New cards

Hash collision

When two different inputs produce the same hash output. Bad — breaks integrity assumptions.

21
New cards

MD5

Older hash algorithm, now considered broken (collisions found).

22
New cards

SHA-1

Hash algorithm now deprecated due to collision attacks.

23
New cards

SHA-256

Secure modern hash algorithm in the SHA-2 family; widely used.

24
New cards

bcrypt / scrypt / Argon2

Slow hash functions designed specifically for password storage.

25
New cards

Salt

A random value added to a password before hashing to prevent rainbow table attacks and ensure unique hashes for identical passwords.

26
New cards

Rainbow Table

A precomputed table of hash values used to reverse-lookup hashed passwords. Salting defeats this.

27
New cards

Symmetric Encryption

Encryption where the same key is used to encrypt and decrypt. Fast, but key distribution is the hard part. Examples: AES, DES, 3DES.

28
New cards

Asymmetric Encryption

Encryption using a key pair (public + private). Encrypt with public → decrypt with private (confidentiality); sign with private → verify with public (authenticity). Examples: RSA, ECC, Diffie-Hellman.

29
New cards

Public Key

The shareable half of an asymmetric key pair; used to encrypt to the owner or verify their signatures.

30
New cards

Private Key

The secret half of an asymmetric key pair; used to decrypt data sent to you or sign data as you.

31
New cards

Key Pair

The matched public + private key set used in asymmetric cryptography.

32
New cards

Hybrid Encryption

Using asymmetric encryption to securely exchange a symmetric key, then using symmetric encryption for the actual data. (How TLS works.)

33
New cards

AES

Advanced Encryption Standard — modern symmetric encryption algorithm.

34
New cards

RSA

Common asymmetric encryption algorithm based on factoring large numbers.

35
New cards

ECC

Elliptic Curve Cryptography — asymmetric algorithm with smaller keys for the same strength as RSA.

36
New cards

Diffie-Hellman

Asymmetric key-exchange protocol for securely agreeing on a shared symmetric key.

37
New cards

Malware

Malicious software designed to damage, disrupt, or gain unauthorized access.

38
New cards

Virus

Malware that attaches to a host file and needs user action to spread.

39
New cards

Worm

Self-replicating malware that spreads across networks without user action.

40
New cards

Trojan

Malware disguised as legitimate software; doesn’t self-replicate.

41
New cards

Ransomware

Malware that encrypts data and demands payment to restore access.

42
New cards

Spyware

Malware that secretly collects information (keystrokes, browsing).

43
New cards

Adware

Malware that forces advertisements; sometimes a delivery mechanism for other malware.

44
New cards

Rootkit

Malware that hides itself deep in the OS, often with kernel-level access.

45
New cards

Keylogger

Malware that records keystrokes.

46
New cards

Botnet

A network of infected machines (zombies) controlled by an attacker via C2.

47
New cards

Zombie

An infected host within a botnet, controlled remotely by an attacker.

48
New cards

Fileless Malware

Malware that lives in memory and uses legitimate tools (PowerShell, WMI). Hard to detect.

49
New cards

Logic Bomb

Malware that triggers on a condition (date, action).

50
New cards

IoCs (Indicators of Compromise)

Forensic evidence that a system has been breached.

51
New cards

Examples of IoCs

Unusual outbound traffic, unknown processes, modified system files, unexpected accounts, malware file hashes, beaconing to suspicious IPs, abnormal logins.

52
New cards

Beaconing

Repetitive, periodic outbound traffic from an infected host to a C2 server. A key IoC.

53
New cards

Cyber Kill Chain

Lockheed Martin’s 7-stage model of how an attacker progresses through an attack.

54
New cards

Kill Chain Stage 1 — Reconnaissance

Gathering information on the target through OSINT, scanning, social media, etc.

55
New cards

Kill Chain Stage 2 — Weaponization

Building the payload — e.g., pairing an exploit with malware in a malicious PDF.

56
New cards

Kill Chain Stage 3 — Delivery

Sending the weapon to the victim (phishing email, USB drop, drive-by download).

57
New cards

Kill Chain Stage 4 — Exploitation

Triggering the vulnerability to execute code on the target.

58
New cards

Kill Chain Stage 5 — Installation

Establishing persistence on the system (malware, backdoor, registry keys).

59
New cards

Kill Chain Stage 6 — Command & Control (C2)

Attacker remotely controls the compromised system through a C2 channel.

60
New cards

Kill Chain Stage 7 — Actions on Objectives

Attacker carries out their goal — steal data, encrypt files, pivot, destroy.

61
New cards

Kill Chain Mnemonic (R-W-D-E-I-C-A)

Recon, Weaponize, Deliver, Exploit, Install, C2, Actions.

62
New cards

Social Engineering

Manipulating people instead of systems; exploits trust, authority, urgency, fear, or curiosity.

63
New cards

Phishing

Mass-emailed lure designed to steal credentials or install malware.

64
New cards

Spear Phishing

Targeted phishing using personal details about a specific victim.

65
New cards

Whaling

Phishing aimed at high-value targets like executives.

66
New cards

Vishing

Voice/phone phishing.

67
New cards

Smishing

SMS-based phishing.

68
New cards

Pretexting

Inventing a believable scenario to gain trust (“I’m from IT…”).

69
New cards

Baiting

Leaving infected USB drives or fake downloads to tempt victims.

70
New cards

Tailgating / Piggybacking

Following an authorized person through a secured door without credentials.

71
New cards

Quid Pro Quo

Offering a benefit in exchange for information or access.

72
New cards

Shoulder Surfing

Watching someone enter a password or PIN.

73
New cards

Dumpster Diving

Searching trash for sensitive information.

74
New cards

Defenses Against Social Engineering

Security awareness training, verification procedures, MFA, strict policies, principle of least privilege.

75
New cards

Port

A numbered endpoint on a host that identifies a specific network service (range 0–65535).

76
New cards

Well-Known Ports

Port range 0–1023, reserved for common services.

77
New cards

Registered Ports

Port range 1024–49151, assigned to specific applications.

78
New cards

Dynamic / Ephemeral Ports

Port range 49152–65535, used for short-lived client connections.

79
New cards

Port 20 / 21

FTP — File Transfer Protocol (20 = data, 21 = control). Unencrypted.

80
New cards

Port 22

SSH / SFTP — Secure remote shell and secure file transfer.

81
New cards

Port 25

SMTP — Sending email.

82
New cards

Port 53

DNS — Domain Name Resolution.

83
New cards

Port 80

HTTP — Web traffic, unencrypted.

84
New cards

Port 110

POP3 — Receiving email.

85
New cards

Port 143

IMAP — Receiving email.

86
New cards

Port 443

HTTPS — Web traffic, encrypted with TLS.

87
New cards

Port 3306

MySQL — Database connections.

88
New cards

Port 3389

RDP — Remote Desktop Protocol.

89
New cards

MITM (Man-in-the-Middle)

Attack where the attacker secretly relays or alters communications between two parties who think they’re talking directly.

90
New cards

ARP Spoofing / Poisoning

Tricking devices on a LAN into sending traffic to the attacker by sending forged ARP messages.

91
New cards

DNS Spoofing

Redirecting a domain name lookup to a malicious IP address.

92
New cards

SSL Stripping

Downgrading an HTTPS connection to HTTP so traffic can be read in plaintext.

93
New cards

Evil Twin

A rogue Wi-Fi access point that mimics a real one to lure victims.

94
New cards

Session Hijacking

Stealing a user’s session token or cookie to impersonate them.

95
New cards

Packet Sniffing

Passive interception of network traffic (e.g., Wireshark on open Wi-Fi).

96
New cards

MITM Defenses

HTTPS everywhere, HSTS, certificate pinning, VPNs, encrypted DNS (DoH/DoT), mutual TLS.

97
New cards

HSTS

HTTP Strict Transport Security — forces browsers to only use HTTPS for a domain.

98
New cards

Certificate Pinning

Hard-coding which certificate(s) a client trusts for a server, preventing MITM via fake certs.

99
New cards

Injection Attack

Attack where untrusted input is interpreted as code or commands by the receiving system.

100
New cards

SQL Injection (SQLi)

Inserting SQL statements into form fields/inputs to manipulate a database. Example: ’ OR ‘1’=’1 to bypass login.