This class was created by Brainscape user Kevin Halpin. Visit their profile to learn more about the creator.

Decks in this class (16)

Chapter 1
What is the cia triad,
What is confidentiality,
What is integrity
29  cards
Chapter 2
What are 2 requirements for symet...,
What do cryptanalytic attacks rel...,
What is the most widly used encyp...
11  cards
Chapter 3
What is the basic usecase for aut...,
What is the basic,
What are the 4 means of authentic...
21  cards
Chapter 4
What is access control,
Is access control the same as aut...,
What is discretionary access cont...
28  cards
Chapter 5
What does a sql injection do,
What is the most common attack go...,
How does an sqli attack typically...
15  cards
Chapter 6
How is malware classified into 2 ...,
What are 3 propogation techniques...,
What does malware do once it reac...
38  cards
Review Day
What are the 3 uses for crypto tools,
2 ways to hack a database,
What are the 4 phases of a virus
15  cards
Old Exam
Why are detection techniques just...,
What does an information systems ...,
Can the aes symetric cryptosystem...
7  cards
Chapter 7 (DOS attacks)
What is a dos attack,
3 categories of resources that ca...,
What is a flooding ping command
15  cards
Chapter 8 (Intrusion Detection)
3 main classes of intruders,
What are these examples of,
What are these examples of
19  cards
Chapter 9 (Firewalls)
Is a firewall a single computer s...,
What are the 3 main design goals ...,
What is a firewall access policy
13  cards
Chapter 10 (Buffer Overflow)
What is a buffer overflow,
Where are 3 locations a buffer co...,
What are 4 possible consequences ...
23  cards
Chapter 23 (Internet Authentication)
Basic idea behind kerberos,
What does a kerebos enviorment co...,
What is a certificate authority
7  cards
Chapter 24 (Wireless Network Security)
4 reasons wireless networks are m...,
2 countermeasures from eavsedropping,
Main threat involving wireless ac...
5  cards
Chapter 11 (Software Vulnerabilities)
3 main categories of software errors,
Def of defensive programming,
Key rule behind defensive program...
12  cards
Chapter 22 (Internet Security Protocols and Standards)
Mime vs s mime,
What is dkim,
Tls session vs tls connection
15  cards

More about
CS 356

  • Class purpose General learning

Learn faster with Brainscape on your web, iPhone, or Android device. Study Kevin Halpin's CS 356 flashcards for their Briar Cliff University class now!

How studying works.

Brainscape's adaptive web mobile flashcards system will drill you on your weaknesses, using a pattern guaranteed to help you learn more in less time.

Add your own flashcards.

Either request "Edit" access from the author, or make a copy of the class to edit as your own. And you can always create a totally new class of your own too!

What's Brainscape anyway?

Brainscape is a digital flashcards platform where you can find, create, share, and study any subject on the planet.

We use an adaptive study algorithm that is proven to help you learn faster and remember longer....

Looking for something else?

GIA CS
  • 27 decks
  • 406 flashcards
  • 5 learners
Decks: Cs 1, Cs 2, Cs 3, And more!
iGCSE CS 23
  • 20 decks
  • 632 flashcards
  • 33 learners
Decks: 11 Binary Hex Number Systems, 12 13 Text Images Sound Memory Size, 13 22 Compression Error Detection, And more!
Cs 2
  • 23 decks
  • 1159 flashcards
  • 3 learners
Decks: Slit Lamp Biomicroscopy Csb, Slit Lamp Bio Microscopy From Contact Le, History Symptoms Csa, And more!
a - cs
  • 18 decks
  • 579 flashcards
  • 2 learners
Decks: Chapter 1 Information Representation, Chapter 2 Networks, Chapter 2 Internet, And more!
Make Flashcards