SnapCards

Computer Science: Cybersecurity Basics

20 cards|
6 easy10 medium4 hard
computer sciencecybersecuritysecurity

Fundamental cybersecurity concepts — threats, encryption, authentication, and security principles.

Study these flashcards with spaced repetition

Track your progress, master difficult cards, and export to Anki. Free to start.

Start Studying — Free

Flashcards in This Deck

1
easy

Which pillar of the CIA triad ensures that sensitive information is only accessible to authorized individuals?

Confidentiality

2
easy

Which component of the CIA triad focuses on protecting data from unauthorized modification or deletion to ensure its accuracy?

Integrity

3
easy

Which CIA triad principle ensures that systems and data are accessible to authorized users when needed?

Availability

4
medium

How does an attacker typically execute a SQL injection (SQLi) attack against a web application?

By inserting malicious SQL code into input fields that are later executed by the backend database.

5
medium

What is the primary difference between Stored (Persistent) XSS and Reflected XSS?

Stored XSS involves malicious scripts permanently saved on the server, while Reflected XSS involves scripts bounced off a web server to a victim via a link.

6
medium

Explain how a Cross-Site Request Forgery (CSRF) attack exploits the trust a site has in a user's browser.

It tricks a logged-in user's browser into sending an unauthorized request to a web application where the user is currently authenticated.

7
medium

In a Man-in-the-Middle (MITM) attack, what is the attacker's primary objective regarding the communication channel?

To secretly intercept, and possibly alter, the communication between two parties who believe they are communicating directly.

8
easy

What is the term for a social engineering attack where attackers send fraudulent emails to trick individuals into revealing sensitive information?

Phishing

9
easy

What is the primary goal of a Distributed Denial of Service (DDoS) attack?

To overwhelm a target system's resources or bandwidth with a flood of traffic from multiple sources, making it unavailable to legitimate users.

10
hard

Explain the mechanism of a stack-based buffer overflow and how it can lead to arbitrary code execution.

An attacker writes more data to a buffer than it can hold, overwriting adjacent memory, specifically the return address on the stack, to point to malicious code.

+10 more cards — sign up to see all

Frequently Asked Questions

How many flashcards are in this Computer Science: Cybersecurity Basics deck?

This deck contains 20 flashcards with a mix of difficulty levels: 6 easy, 10 medium, and 4 hard cards.

Is this flashcard deck free to use?

Yes! You can study these flashcards for free with our spaced repetition system. Create a free account to track your progress and save your study history.

Can I export these flashcards to Anki?

Pro users can export any deck to Anki (.apkg format) with one click. Free users can export to CSV. Start studying for free and upgrade when you need Anki export.

What is spaced repetition?

Spaced repetition is a study technique that shows you cards at increasing intervals based on how well you know them. Cards you struggle with appear more often, while mastered cards are shown less frequently. This is proven to be one of the most effective ways to memorize information.

Related Flashcard Decks

Ready to study?

Create a free account and start studying these flashcards with spaced repetition.

Get Started — Free