Summary: Security (Pre-Master 2021-2022)

Study material generic cover image
  • This + 400k other summaries
  • A unique study and practice tool
  • Never study anything twice again
  • Get the grades you hope for
  • 100% sure, 100% understanding
PLEASE KNOW!!! There are just 52 flashcards and notes available for this material. This summary might not be complete. Please search similar or other summaries.
Use this summary
Remember faster, study better. Scientifically proven.
Trustpilot Logo

Read the summary and the most important questions on Security (Pre-Master 2021-2022)

  • 1 Computer Security

    This is a preview. There are 2 more flashcards available for chapter 1
    Show more cards here

  • Give an example of safety and one of security.

    Safety: Tsunami, fire, traffic, power outage...
    Security: Terrorism, fraud, theft, abuse, war...
  • Who conduct attacks against computer systems?

    It goes from script kiddies to nation states.

    Script kiddie is a person who uses  existing computer scripts or codes to hack into computers. They don't have enough knowledge to write their own.
  • What are the intentions to conduct an attack against a computer system?

    It can be done for fun (to show off) or for malicious intents (in a stealthy way).
  • 2 Authentication

    This is a preview. There are 18 more flashcards available for chapter 2
    Show more cards here

  • Name the four types of authentication factors and give an example for each of them.

    1. Something you are: Biometrics, captcha's.
    2. Something you know: Passwords, PINs.
    3. Something you have: Bank card, laptop, Google authenticator code.
    4. Your context: Distance from car, access to e-mail, geotracking (aka your current location.
  • What is the term for enforcing multiple authentication factors?

    Two-factor or multi-factor authentication.
  • Are security questions a form of strong authentication?

    No, they are weak.
    Questions like your mother's middle name, your birth location... are easy to guess/find and are privacy invasive.
  • Name an advantage and a disadvantage for the usage of biometrics.

    - Advantage: User-friendly.
    - Disadvantage: Technically challenging and it is only useful in multi-factor authentication (so not really on its own).
  • What is a PIN (personal identification number)?

    A (usually short) string of numeric characters.
  • What two types of guessing (i.e. for passwords) are there?

    - Online guessing: an attacker tries a large number of username/password combinations against the login portal to guess the correct password.
    - Offline guessing: an attacker can get a hash of your password that they can take offline and try to crack it.
  • What is end-to-end encryption (E2EE)?

    The encryption of messages so only the sender and the receiver can read the messages. This prevents eavesdroppers.
PLEASE KNOW!!! There are just 52 flashcards and notes available for this material. This summary might not be complete. Please search similar or other summaries.

To read further, please click:

Read the full summary
This summary +380.000 other summaries A unique study tool A rehearsal system for this summary Studycoaching with videos
  • Higher grades + faster learning
  • Never study anything twice
  • 100% sure, 100% understanding
Discover Study Smart

Topics related to Summary: Security (Pre-Master 2021-2022)