This class was created by Brainscape user Egan Da Silva. Visit their profile to learn more about the creator.

Decks in this class (31)

Week 7 - SQL Injection
What is sql injection,
Where are sql injection attacks used,
When would you use an sql injecti...
15  cards
Week 7 - Web Security Threats
What is cross site scripting xss,
Where does xss happen,
What are the two xss categories
27  cards
Week 7 - Malware
What is malware,
What is zero day malware,
What are the 3 types of malware
28  cards
Week 8 - Usable Security
What is the main focus of usable ...,
What does security as a supportin...,
What is the difference between a ...
14  cards
Week 8 - Social Engineering
What is social engineering,
What is pretexting,
What is
10  cards
Week 8 - Phishing
What is phishing,
How to mitigate the risk of phish...,
How do phishing attacks work
5  cards
Week 8 - Advanced Persistent Threats
What is apt,
What males apt concerning,
What are the key stages of an apt...
5  cards
Week 8 - Mitigating Human Factor Risks
How can you use senior leadership,
How can you use staff,
How should cyber security trainin...
5  cards
Week 8 - Threat Modelling
What is threat modelling,
Why is threat modelling important,
What four questions does threat m...
26  cards
Week 1 - Intro to Security
What is cyber security,
What is information security,
What is computer security
12  cards
Week 1 - Intro to Cryptography
What is a cypher,
What is encryption,
What is decryption
6  cards
Week 1 - Cryptographic Hash Functions
What is are cryptographic primitives,
What is a cryptographic hash func...,
What does it mean to be determini...
8  cards
Week 1 - Substitution Cyphers
What are the two main techniques ...,
What is a caesar cipher,
What is the vigenere cipher
5  cards
Week 1 - Stream + Block Cypher
What is a stream cypher,
How does a stream cipher perform ...,
Why use a stream cipher
7  cards
Week 1 - Feistel Structure
What is feistel structure,
How is a feistel structure executed,
What happens with main encryption...
5  cards
Week 1 - Modern Block Ciphers
What is s box cypher substitution...,
What is p box cypher permutation box,
What are the three types of p boxes
6  cards
Week 1 - AES, Blowfish, Modes of Operation
What is advanced encryption stand...,
What steps are performed in each ...,
What is blowfish
7  cards
Week 2 - Diffie-Hellman Key Exchange
What is the purpose of diffe hell...,
How does diffie hellman key work,
Why is the diffie hellman key exc...
3  cards
Week 2 - Public Key Cryptography
What is the key distribution problem,
What are some solutions to the ke...,
What are the properties of public...
7  cards
Week 2 - RSA
What is rsa,
What is the first step,
What is step 2 calculate n
8  cards
Week 2 - Randomness + One-Time Pads
What is true randomness,
Examples of true randomness,
What is a pseudo random number ge...
12  cards
Week 2 - Digital Signatures
What is a digital signature,
What key pair is used in digital ...,
How does a digital signature ensu...
8  cards
Week 2 - End to End Encryption
What is end to end encryption e2ee,
What cryptographic techniques are...,
Advantages of e2ee
4  cards
Week 3 - Steganography
What is steganography,
What is the process of modern ste...
2  cards
Week 3 - LSB algorithm
What is lsb algorithm,
What is the least significant bit...,
Why is the least significant bit ...
6  cards
Week 3 - BPCS Algorithm
What is the bpcs algorithm,
How does the bpcs algorithm diffe...,
What is a bitplane
9  cards
Week 3 - Access Control
What are the three stages of acce...,
What are the three factors of use...,
What is multifactor authenticatio...
4  cards
Week 3 - Password Security
What are the three aspects of pas...,
What makes a password strong,
Problems with high entropy passwords
10  cards
Week 3 - Biometrics
What are biometrics,
Examples of physical vs behaviora...,
Two stages of biometric authentic...
10  cards
Week 3 - Authorisation
What is the difference between au...,
How is authorization managed in a...,
What is the principle of least pr...
5  cards
Week 4 - Logging
What is logging,
What are the challenges in logging,
What are some sources of log data
5  cards

More about
CS407

  • Class purpose General learning

Learn faster with Brainscape on your web, iPhone, or Android device. Study Egan Da Silva's CS407 flashcards now!

How studying works.

Brainscape's adaptive web mobile flashcards system will drill you on your weaknesses, using a pattern guaranteed to help you learn more in less time.

Add your own flashcards.

Either request "Edit" access from the author, or make a copy of the class to edit as your own. And you can always create a totally new class of your own too!

What's Brainscape anyway?

Brainscape is a digital flashcards platform where you can find, create, share, and study any subject on the planet.

We use an adaptive study algorithm that is proven to help you learn faster and remember longer....

Looking for something else?

Make Flashcards