Shared Flashcard Set

Details

Security + Chapter 7
Security + Chapter 7
24
Computer Science
Not Applicable
08/02/2012

Additional Computer Science Flashcards

 


 

Cards

Term
Default Account
Definition
An account installed by default on a device or within an operating system with a default set of user credentials that are usually insecure.
Term
Privilege Escalation
Definition
The act of exploiting a bug or design flaw in a software or firmware application to gain access to resources that normally would’ve been protected from an application or user.
Term
Backdoors
Definition
Used in computer programs to bypass normal authentication and other security mechanisms in place.
Term
Crosstalk
Definition
When a signal transmitted on one copper wire creates an undesired effect on another wire; the signal “bleeds” over, so to speak.
Term
Data Emanation
Definition
The electromagnetic field generated by a network cable or network device, which can be manipulated to eavesdrop on conversations or to steal data.
Term
Vampire Tap
Definition
A device used to add computers to a 10BASE5 network. It pierces the copper conductor of a coaxial cable and can also be used for malicious purposes.
Term
Wiretapping
Definition
Tapping into a network cable in an attempt to eavesdrop on a conversation or steal data.
Term
Chromatic Dispersion
Definition
The refraction of light as in a rainbow. If light is refracted in such a manner on fiber optic cables, the signal cannot be read by the receiver.
Term
EMI
Definition

Electromagnetic Interference

 

A disturbance that can affect electrical circuits, devices, and cables due to electromagnetic conduction or radiation.

Term
RFI
Definition

Radio Frequency Interference

 

Interference that can come from AM/FM transmissions and cell towers.

Term
TEMPEST
Definition
Refers to the investigations of conducted emissions from electrical and mechanical devices, which could be compromising to an organization.
Term
Faraday Cage
Definition
An enclosure formed by conducting material or by a mesh of such material; it blocks out external static electric fields and can stop emanations from cell phones and other devices within the cage from leaking out.
Term
Butt Set
Definition
A device that looks similar to a phone but has alligator clips that can connect to the various terminals used by phone equipment, enabling a person to listen in to a conversation.
Term
SSID
Definition

Service Set Identifier

 

The name of a wireless access point (or network) to which network clients will connect; it is broadcast through the air.

Term
WEP
Definition

Wired Equivalent Privacy

 

A deprecated wireless network security standard, less secure than WPA.

Term
WPA
Definition

Wi-Fi Protected Access

 

A security protocol created by the Wi-Fi Alliance to secure wireless computer networks, more secure than WEP.

Term
AES
Definition

Advanced Encryption Standard

 

An encryption standard used with WPA and WPA2. The successor to DES/3DES and is another symmetric key encryption standard composed of three different block ciphers: AES-128, AES-192, and AES-256.

Term
TKIP
Definition

Temporal Key Integrity Protocol

 

An algorithm used to secure wireless computer networks; meant as a replacement for WEP.

Term
MAC Filtering
Definition
A method used to filter out which computers can access the wireless network; the WAP does this by consulting a list of MAC addresses that have been previously entered.
Term
AP Isolation
Definition
Each client connected to the AP will not be able to communicate with each other, but they can each still access the Internet.
Term
Wardriving
Definition
The act of searching for wireless networks by a person in a vehicle through the use of a device with a wireless antenna, often a particularly strong antenna.
Term
IV Attack
Definition
A type of related-key attack, which is when an attacker observes the operation of a cipher using several different keys, and finding a mathematical relationship between them, allowing the attacker to ultimately decipher data.
Term
Bluejacking
Definition
The sending of unsolicited messages to Bluetooth-enabled devices such as mobile phones and PDAs.
Term
Bluesnarfing
Definition
The unauthorized access of information from a wireless device through a Bluetooth connection.
Supporting users have an ad free experience!