Shared Flashcard Set

Details

CEH Certified Ethical Hacker 312-50:Introduction terms
CEH Certified Ethical Hacker 312-50:Introduction terms
27
Computer Science
Professional
01/23/2014

Additional Computer Science Flashcards

 


 

Cards

Term
CIA: meaning
Definition
Confidentiality, Integrity, Availability
Term
Authentication
Definition
Most common method to maintain confidentiality.
Term
Other term for authentication attack
Definition
Other term for Confidentiality attack
Term
Availability
Definition
Communications and data must be available when users need them
Term
Reconnaissance
Definition
Hacking step 1
Term
Scanning and Enumeration
Definition
Hacking Step 2
Term
Gaining Access (Escalation of privileges just after this)
Definition
Hacking Step 3 (including this augmenting task)
Term
Maintaining Access
Definition
Hacking Step 4
Term
Covering Tracks
Definition
Hacking step 5
Term
TOE
Definition
Target of evaluation
Term
Black Box
Definition
Attack from the outside by a user who has no knowledge of the systems; weakness: does not allow for simulation of an insider attack.
Term
White Box
Definition
Attack from the inside by a user with total knowledge of the systems; designed to simulate an attack from within.
Term
Grey Box
Definition
AKA partial knowledge testing; can demonstrate privilege escalation by a trusted employee.
Term
Hack value
Definition
It is the notion among hackers that something is worth doing or is interesting
Term
Target of Evaluation (TOE)
Definition
An IT system, product or component that is identified/subjected to a required security evaluation
Term
Threat
Definition
An action or event which might compromise security. A threat is a potential violation of security
Term
Vulnerability
Definition
A weakness, design or implementation error that can lead to an unexpected and undesirable event, compromising the security of a system
Term
Attack
Definition
An assault on the system security derived from an intelligent threat. An attack is any action violating security.
Term
Exploit
Definition
A defined way to breach the security of an IT system through vulnerability
Term
Zero-day
Definition
A computer threat that tries to exploit computer application vulnerabilities that are unknown to others or undisclosed to the software developer
Term
Security
Definition
A state of well-being of information and infrastructure in which the possibility of theft, tampering, and disruption of information and services is kept low or tolerable
Term
Daisy Chaining
Definition
Advance on a SQL database, and then leaving but cleaning up tracks during leaving
Term
Risk
Definition
Occurs when vulnerability combines with a threat
Term
Phreakers
Definition
Hacker who doesn't cover tracks and doesn't care if they get caught.
Term
Script kiddie
Definition
Novice hacker
Term
Whacker
Definition
Hacker who has inflated view of themself.
Term
Hacktivist
Definition
Hacker for a cause.
Supporting users have an ad free experience!