This class was created by Brainscape user Kevin Halpin. Visit their profile to learn more about the creator.

Decks in this class (16)

Chapter 1
What is the cia triad 1,
What is confidentiality 2,
What is integrity 3
29  cards
Chapter 2
What are 2 requirements for symet...,
What do cryptanalytic attacks rel...,
What is the most widly used encyp...
11  cards
Chapter 3
What is the basic usecase for aut...,
What is the basis for access cont...,
What are the 4 means of authentic...
21  cards
Chapter 4
What is access control 1,
Is access control the same as aut...,
What is discretionary access cont...
28  cards
Chapter 5
What does a sql injection do 1,
What is the most common attack go...,
How does an sqli attack typically...
15  cards
Chapter 6
How is malware classified into 2 ...,
What are 3 propogation techniques...,
What does malware do once it reac...
38  cards
Review Day
What are the 3 uses for crypto to...,
2 ways to hack a database 2,
What are the 4 phases of a virus 3
15  cards
Old Exam
Why are detection techniques just...,
What does an information systems ...,
Can the aes symetric cryptosystem...
7  cards
Chapter 7 (DOS attacks)
What is a dos attack 1,
3 categories of resources that ca...,
Why are source ip addresses spoof...
15  cards
Chapter 8 (Intrusion Detection)
3 main classes of intruders 1,
What are these examples of 2,
What are these examples of 3
19  cards
Chapter 9 (Firewalls)
Is a firewall a single computer s...,
What are the 3 main design goals ...,
What is a firewall access policy 3
13  cards
Chapter 10 (Buffer Overflow)
What is a buffer overflow 1,
Where are 3 locations a buffer co...,
What are 4 possible consequences ...
23  cards
Chapter 23 (Internet Authentication)
Basic idea behind kerberos 1,
What does a kerebos enviorment re...,
What is a certificate authority 3
7  cards
Chapter 24 (Wireless Network Security)
4 reasons wireless networks are m...,
2 countermeasures from eavsedropp...,
What is association reassociation...
5  cards
Chapter 11 (Software Vulnerabilities)
3 main categories of software err...,
Def of defensive programming 2,
Key rule behind defensive program...
12  cards
Chapter 22 (Internet Security Protocols and Standards)
Mime vs s mime 1,
What is dkim 2,
Tls session vs tls connection 3
15  cards

More about
CS 356

  • Class purpose General learning

Learn faster with Brainscape on your web, iPhone, or Android device. Study Kevin Halpin's CS 356 flashcards for their Briar Cliff University class now!

How studying works.

Brainscape's adaptive web mobile flashcards system will drill you on your weaknesses, using a pattern guaranteed to help you learn more in less time.

Add your own flashcards.

Either request "Edit" access from the author, or make a copy of the class to edit as your own. And you can always create a totally new class of your own too!

What's Brainscape anyway?

Brainscape is a digital flashcards platform where you can find, create, share, and study any subject on the planet.

We use an adaptive study algorithm that is proven to help you learn faster and remember longer....

Looking for something else?

a - cs
  • 28 decks
  • 998 flashcards
  • 2 learners
Decks: Chapter 1 Information Representation, Chapter 2 Networks, Chapter 2 Internet, And more!
CS 115 Computer Science
  • 30 decks
  • 997 flashcards
  • 775 learners
Decks: Chapter 1 Checkpoint, Chapter 1 Notes Pt 1, Chapter 1 Notes Pt 2, And more!
!!!!CS/UX: Software Engineering
  • 26 decks
  • 3019 flashcards
  • 50 learners
Decks: Non Linear Data Structures, Linear Data Structures, Algorithms, And more!
CS 372
  • 13 decks
  • 683 flashcards
  • 218 learners
Decks: Final, Export Week 1 1, Export Week 2, And more!
Make Flashcards