White Hat

Ace your homework & exams now with Quizwiz!

distributed denial of service

An attack that uses many computers to perform a DoS attack

Certified Information Systems Security Professional

At least five years of cumulative, paid, full-time work experience in two or more of the eight domains of the CISSP Common Body of Knowledge (CBK)

Offensive Security Certified Professional

The tester studies a virtual network and attempts to hack into it. At the end of attacking, the tester submits a detailed report on successful and failed attacks, and the vulnerabilities found.

Certificate authority

Trusted third party that generates and maintains user certificates, which hold their public key

denial of service

an attack on a network resource that prevents authorized users from accessing the system

Tor

an onion browser; popular in the cyber security community

Penetration testing

and evaluation of the security of a network or system by actively simulating an attack.,

HTTPS

hypertext transfer protocol over secure sockets layer

SSL

protocol to manage the security of the website by encrypting the data exchanged in that site

Digital certificate

used for being accepted by the trust model of the internet

Trust model

uses various third party entities to validate the validity/safety of websites

White hat

Ethical hacker or researcher.

Cyber security forensic analyst

Specialist who investigates cyber crimes


Related study sets

15.6 Module Quiz - Application Layer

View Set

Chapter 12 - Social Class7Differences

View Set

FIN 338 Topic 4: Financial structuring

View Set

Art Appreciation Midterm Study Guide

View Set

SS.912.A.1.4, SS.912.A.2.1, SS.912.A.3.1, SS.912.A.3.2

View Set