UOFG_CYBER_SECURITY

This class was created by Brainscape user michal wozniak. Visit their profile to learn more about the creator.

Decks in this class (18)

Lecture 1 - Introduction
Some cyber attacks,
Steps of the high level plan for ...,
What is the goal of a cyber secur...
31  cards
Lecture 2 - Networks
What are the 5 types of networks,
What is a lan,
What is a pan
18  cards
Lecture 3 - Access Control Basics
What is access control,
What are the 3 processes of acces...,
What is authentication
13  cards
Lecture 3 - DAC and Access Matrices
Dac,
How is a dac typically implemented,
Why is an access matrix decomposed
19  cards
Lecture 3 - RBAC
What is rbac,
Role is typically,
Roles can be
15  cards
Lecture 3 - ABAC
Abac,
What is a concern with abac,
What is abac exceptionally good f...
14  cards
Lecture 2 - Cyberattack Basics
What is a cyber attack,
What are the two types of attacks,
What is an active attack
12  cards
Lecture 2 - SYN Spoofing
What layer does syn spoofing target,
What type of a cyberattack is syn...,
How does syn spoofing work
5  cards
Lecture 2 - UDP Flood
What type of attack is udp flood,
What does a udp flood do,
Where is udp used
3  cards
Lecture 2 - DDOS
What does ddos stand for,
What is ddos,
Why is seperating ddos traffic an...
5  cards
Lecture 2 - MiTM
What does mitm stand for,
What is a man in the middle attack,
What is the goal of a mitm
5  cards
Lecture 2 - Security Protocols
Simplest protocol,
When is using memorisation approp...,
Second simplest protocol
16  cards
Lecture 4 - Cryptography Basics
What are the ingredients of crypt...,
Classification of cryptography,
What is the difference between bl...
8  cards
Lecture 8 - Web App Security
What is a web application,
What does a web application typic...,
What is a webpage
26  cards
Lecture 9 - Digital Forensics Basics
What is digital forensics,
What are the goals of digital for...,
What kind of events are analysed ...
14  cards
Lecture 9 - Process Of Digital Forensics Steps 1 & 2
What are the steps of computer fo...,
What should be done upon arriving...,
What is essential in investigatio...
15  cards
Lecture 9 - Process of digital forensics Step 3
What is the 3rd step of computer ...,
Steps of analysis,
First step of the analysis step
13  cards
Lecture 9 - Process Of Digital Forensics Step 4
What is the 4th step of computer ...,
What should the report contain,
What should the investigator be p...
4  cards

More about
UOFG_CYBER_SECURITY

  • Class purpose General learning

Learn faster with Brainscape on your web, iPhone, or Android device. Study michal wozniak's UOFG_CYBER_SECURITY flashcards now!

How studying works.

Brainscape's adaptive web mobile flashcards system will drill you on your weaknesses, using a pattern guaranteed to help you learn more in less time.

Add your own flashcards.

Either request "Edit" access from the author, or make a copy of the class to edit as your own. And you can always create a totally new class of your own too!

What's Brainscape anyway?

Brainscape is a digital flashcards platform where you can find, create, share, and study any subject on the planet.

We use an adaptive study algorithm that is proven to help you learn faster and remember longer....

Looking for something else?

Make Flashcards