csc final

studied byStudied by 17 people
5.0(1)
get a hint
hint

DDoS

1 / 32

encourage image

There's no tags or description

Looks like no one added any tags here yet for you.

Studying Progress

0%
New cards
33
Still learning
0
Almost done
0
Mastered
0
33 Terms
1
New cards

DDoS

A (distributed) denial of service attack that targets websites and web servers with the intention of bringing the services they provide to a halt. If one host is involved in the attack, the attack is considered to be a DoS attack. If multiple hosts are involved, it is a DDoS attack.

New cards
2
New cards

Packet

Small units of data, transmitted on a network. Collected together, they compose some larger data, such as a document, a website, a movie, etc.

New cards
3
New cards

Site Certificate

A site certificate, also called a security certificate, is a small data file that is validated by a "certificate authority". It allows an organization to have a secure website.

New cards
4
New cards

Decrypt

Reverse the encryption process, making the data human-readable again.

New cards
5
New cards

Penetration Test

Performing a computer attack to evaluate the security of a system.

New cards
6
New cards

Forceful Browsing

When hackers can use their knowledge of a web server's directory structure to craft URL addresses and navigate to locations that are unreferenced and unlinked in a web site .

New cards
7
New cards

Virtual Machine

An emulation of a computer system.

New cards
8
New cards

Host

A computer, typically one on a network. A host can also be referred to as a machine or a system.

New cards
9
New cards

Hardening

In terms of computer science, hardening a system means to increase its security and reduce its vulnerabilities.

New cards
10
New cards

Attack Surface

The sum of all the vulnerabilities that allow unauthenticated users to attack a network. The smaller the attack surface, the more secure is the network.

New cards
11
New cards

Client

In a client-server model, a client is the device that is requesting information or services from a server on a network.

New cards
12
New cards

Abstraction

Abstraction is a very common concept in computer science and information technology; it means that a lot of the detail of a system or a process is hidden, allowing the user to focus on the details that are important for the task at hand.

New cards
13
New cards

Exploit

A piece of software or a sequence of commands that takes advantage of a vulnerability in a computer system to cause unexpected behavior to occur.

New cards
14
New cards

HTML tag

A code that defines every structure on an HTML page, such as text, images, and links. HTML tags begin with the less-than (

New cards
15
New cards

Comment

A note in a program that describes what the code is doing. Adding comments is very good programming practice, because it helps the reader of the program understand the code, especially when working on code with other people.

New cards
16
New cards

Cross-site scripting

A type of exploit in which the attacker inserts malicious client-side code into webpages to steal data, take control of a computer, run malicious code, or achieve a phishing scam.

New cards
17
New cards

Linux

An operating system similar in concept to the Windows OS but used more often to host routers and web servers.

New cards
18
New cards

LAN

A small local area network of computers and devices.

New cards
19
New cards

Routing Table

Data that is stored in a router in table format. It contains addresses of known networks (other routers), ones that have already been discovered and used. When a new, unknown network destination is discovered, the router will update its routing table.

New cards
20
New cards

Packet sniffer

Refers to the action of watching and analyzing network traffic at the packet level.

New cards
21
New cards

Packet Filtering

In network security, it allows or denies packets based on source and destinations addresses, ports, or protocols.

New cards
22
New cards

MAC Address

A media access control (MAC) addresses is unique numeric code that is assigned to networking hardware components (typically a network interface card or NIC) that is built into computers and mobile devices. The code is assigned by the manufacturer, includes their unique identification number, and never changes.

New cards
23
New cards

Front-end

A part of a process or system that is seen by the user and typically provides functionality to the user.

New cards
24
New cards

Back-end

A part of a process or system that is not seen by the user. It provides a supporting function on behalf of the main process.

New cards
25
New cards

Pcap file

A Wireshark data capture file that contains packet information of network traffic.

New cards
26
New cards

Hexadecimal

Often referred to as hex, hexadecimal is a base-16 number system. The extra digits are represented by the letters a through f, so all digits in hex are 0,1,2,3,4,5,6,7,8,9,a,b,c,d,e,f. You can also see hex numbers in all capitals A through F.

New cards
27
New cards

OUI

The Organizationally Unique Identifier is the first half of the MAC address, designating the manufacturer of the network device. Each manufacturer has their own, individual OUI for each device they produce.

New cards
28
New cards

NIC

A network interface card is a physical component on a computer or device that provides connectivity to a network.

New cards
29
New cards

IEEE

The Institute of Electrical and Electronic Engineers. They are best known for developing standards in the computer and electronics industries.

New cards
30
New cards

Protocol

An agreed-upon method for communication.

New cards
31
New cards

TCP

Transmission Control Protocol used to establish and maintain connections over a computer network.

New cards
32
New cards

TCP Handshake

A three-way communication method using SYN (synchronize), SYN-ACK (synchronize=acknowledge), and ACK (acknowledge) to establish a connection between hosts.

New cards
33
New cards

TLS

Transport Layer Security is a security protocol that uses encryption at a lower level of abstraction.

New cards

Explore top notes

note Note
studied byStudied by 7 people
Updated ... ago
5.0 Stars(1)
note Note
studied byStudied by 58 people
Updated ... ago
5.0 Stars(3)
note Note
studied byStudied by 5 people
Updated ... ago
5.0 Stars(1)
note Note
studied byStudied by 32 people
Updated ... ago
4.7 Stars(3)
note Note
studied byStudied by 7 people
Updated ... ago
5.0 Stars(2)
note Note
studied byStudied by 44 people
Updated ... ago
4.7 Stars(3)
note Note
studied byStudied by 3 people
Updated ... ago
5.0 Stars(1)
note Note
studied byStudied by 62801 people
Updated ... ago
4.9 Stars(582)

Explore top flashcards

flashcards Flashcard72 terms
studied byStudied by 12 people
Updated ... ago
5.0 Stars(2)
flashcards Flashcard100 terms
studied byStudied by 3 people
Updated ... ago
5.0 Stars(1)
flashcards Flashcard45 terms
studied byStudied by 4 people
Updated ... ago
5.0 Stars(1)
flashcards Flashcard38 terms
studied byStudied by 17 people
Updated ... ago
5.0 Stars(2)
flashcards Flashcard72 terms
studied byStudied by 12 people
Updated ... ago
5.0 Stars(2)
flashcards Flashcard41 terms
studied byStudied by 13 people
Updated ... ago
5.0 Stars(1)
flashcards Flashcard97 terms
studied byStudied by 3 people
Updated ... ago
5.0 Stars(1)
flashcards Flashcard56 terms
studied byStudied by 3123 people
Updated ... ago
4.4 Stars(78)