Computer Science: Cybersecurity Basics
Fundamental cybersecurity concepts — threats, encryption, authentication, and security principles.
Study these flashcards with spaced repetition
Track your progress, master difficult cards, and export to Anki. Free to start.
Start Studying — FreeFlashcards in This Deck
Which pillar of the CIA triad ensures that sensitive information is only accessible to authorized individuals?
Confidentiality
Which component of the CIA triad focuses on protecting data from unauthorized modification or deletion to ensure its accuracy?
Integrity
Which CIA triad principle ensures that systems and data are accessible to authorized users when needed?
Availability
How does an attacker typically execute a SQL injection (SQLi) attack against a web application?
By inserting malicious SQL code into input fields that are later executed by the backend database.
What is the primary difference between Stored (Persistent) XSS and Reflected XSS?
Stored XSS involves malicious scripts permanently saved on the server, while Reflected XSS involves scripts bounced off a web server to a victim via a link.
Explain how a Cross-Site Request Forgery (CSRF) attack exploits the trust a site has in a user's browser.
It tricks a logged-in user's browser into sending an unauthorized request to a web application where the user is currently authenticated.
In a Man-in-the-Middle (MITM) attack, what is the attacker's primary objective regarding the communication channel?
To secretly intercept, and possibly alter, the communication between two parties who believe they are communicating directly.
What is the term for a social engineering attack where attackers send fraudulent emails to trick individuals into revealing sensitive information?
Phishing
What is the primary goal of a Distributed Denial of Service (DDoS) attack?
To overwhelm a target system's resources or bandwidth with a flood of traffic from multiple sources, making it unavailable to legitimate users.
Explain the mechanism of a stack-based buffer overflow and how it can lead to arbitrary code execution.
An attacker writes more data to a buffer than it can hold, overwriting adjacent memory, specifically the return address on the stack, to point to malicious code.
+10 more cards — sign up to see all
Frequently Asked Questions
How many flashcards are in this Computer Science: Cybersecurity Basics deck?
This deck contains 20 flashcards with a mix of difficulty levels: 6 easy, 10 medium, and 4 hard cards.
Is this flashcard deck free to use?
Yes! You can study these flashcards for free with our spaced repetition system. Create a free account to track your progress and save your study history.
Can I export these flashcards to Anki?
Pro users can export any deck to Anki (.apkg format) with one click. Free users can export to CSV. Start studying for free and upgrade when you need Anki export.
What is spaced repetition?
Spaced repetition is a study technique that shows you cards at increasing intervals based on how well you know them. Cards you struggle with appear more often, while mastered cards are shown less frequently. This is proven to be one of the most effective ways to memorize information.
Related Flashcard Decks
Ready to study?
Create a free account and start studying these flashcards with spaced repetition.
Get Started — Free