This class was created by Brainscape user Gian Carlo Francisco. Visit their profile to learn more about the creator.

Decks in this class (18)

Quiz 1
True or false a data breach is on...,
True or false overflowing a globa...,
True or false a good example of a...
20  cards
Quiz 2
True or false you are able to acc...,
True or false granting full contr...,
True or false in an offline dicti...
20  cards
L4 - Operating System Security
A computer vendor ad claimed that...,
A system call allows application ...,
Complete mediation ensures that t...
13  cards
L5 - Authentication
What is authentication,
We now have personal devices that...,
An attacker correctly guesses ali...
15  cards
L6 - Access Control
A file is created by a certain us...,
The access control policy in a sy...,
In discretionary access control d...
16  cards
Quiz 3
An object is said to have securit...,
The chinese wall model cwm incorp...,
Kernel mode allows privileged ins...
20  cards
L7 - Mandatory Access Control
What is dac,
What is mac,
In a certain company payroll data...
25  cards
L10 - Modern Malware
The bot spamming is a used by bot...,
The bot click fraud is a used by ...,
The bot phishing is a used by bot...
20  cards
L13 - Intro to Cryptography
If the only form of attack that c...,
What weaknesses can be exploited ...,
Which of the following characteri...
12  cards
L14 - Symmetric Encryption
A block cipher shoulda use substi...,
To decrypt using des same algorit...,
With triple des the effective key...
11  cards
L18
The challenge values in an authen...,
The authentication messages can b...,
Authentication can be one way eg ...
16  cards
L21 - Web Security
Cookies are created by ads that r...,
Cookies are created by websites a...,
Cookies are compiled pieces of co...
16  cards
L17 - Hashes
If the length of a hash is 128 bi...,
The one way hash function is impo...,
Sha processes the input one block...
4  cards
L22 - Cyber Security
Georgia tech account passwords sh...,
A compromise of a computer should...,
Georgia tech computers cannot be ...
14  cards
L23 - Law, Ethics, and Privacy
Technology and other safeguards f...,
Cyber crime is a big problem acco...,
The computer fraud and abuse act ...
14  cards
L11 - Firewalls
A firewall can stop hackers from ...,
A firewall can stop internet traf...,
A firewall can stop viruses and w...
22  cards
L12 - Intrusion Detection
A system that tries to stop intru...,
A system that tries to evaluate a...,
A system that watches for intrusi...
50  cards
L19 - IPSec and TLS
Ip spoofing is useful fora bidire...,
Esp encapsulated security payload...
2  cards

More about
Sec

  • Class purpose General learning

Learn faster with Brainscape on your web, iPhone, or Android device. Study Gian Carlo Francisco's Sec flashcards for their Georgia Tech class now!

How studying works.

Brainscape's adaptive web mobile flashcards system will drill you on your weaknesses, using a pattern guaranteed to help you learn more in less time.

Add your own flashcards.

Either request "Edit" access from the author, or make a copy of the class to edit as your own. And you can always create a totally new class of your own too!

What's Brainscape anyway?

Brainscape is a digital flashcards platform where you can find, create, share, and study any subject on the planet.

We use an adaptive study algorithm that is proven to help you learn faster and remember longer....

Looking for something else?

Science Sec 3
  • 22 decks
  • 719 flashcards
  • 24 learners
Decks: Systeme Digestif Et Nutrition, La Technologie, Procreation Assistee, And more!
Science Sec 4
  • 14 decks
  • 419 flashcards
  • 40 learners
Decks: Quiz 1, Quiz 2, Quiz 3, And more!
CompTIA Sec+ SY0-701
  • 22 decks
  • 953 flashcards
  • 270 learners
Decks: Comptia Sec Sy0 701 Acronyms V1, Comptia Sec Sy0 701 Acronyms V2, Comptia Sec Sy0 701 Acronyms V3, And more!
Human Physiology - PNUR1143 -22S - Sec 1
  • 26 decks
  • 3535 flashcards
  • 30 learners
Decks: Cells, Tissues And Membranes, Integumentary System, And more!
Make Flashcards