This class was created by Brainscape user Vitor R. Visit their profile to learn more about the creator.

Decks in this class (17)

Exam questions
What are the security goals,
What is the difference between as...,
How is management of keys done in...
12  cards
1 - Introduction
What is network security define s...,
Passive vs active attacks,
How to get our network free from ...
11  cards
2 - Physical Link
Physical link layer security tasks,
Wired networks atacks,
Physical access to wireless networks
21  cards
2 - Physical- & Link-Layer Security (Cellular Networks)
What is gsm and how it relates to...,
Describe the gsm infrastructure,
What are hlr and vlr
12  cards
2 - Physical Link: Passive Keyless Entry & Start; Air Traffic Surveillance
Ways to open your car or start yo...,
Passive keyless entry start pkes ...,
Air traffic surveillance today
12  cards
2 .7 - Physical- & Link-Layer Wireless Sensor Networks
Wireless sensor networks overview...,
Roles in wsns,
General limitations in wsns
14  cards
3 - Network- & Transport-Layer Security (Scanning)
What are the tasks of the network...,
What are the tasks of the transpo...,
Explain ip
11  cards
3 - Network- & Transport-Layer (Denial of Service Attacks)
Whats denial of service dos attacks,
Denial of service dos attacks thr...,
Dos attacks
12  cards
3 - Network- & Transport-Layer (Filtering)
Whats filtering,
Whats firewalls,
Why use firewalls
12  cards
3 - Network- & Transport-Layer Security (Intrusion Detection)
What are ids and how the work,
What are the three types of ids e...,
Which are the 4 aspects that shou...
5  cards
3 - Network- & Transport-Layer Security (Eavesdropping)
Describe the man in the middle at...,
Mitm attack is not a thread becau...,
What are other attacks based on arp
4  cards
3 - Network- & Transport-Layer Security (Privacy)
Define privacy,
How to preserve privacy,
Privacy in the internet
29  cards
4 - Application-Layer Security (Privacy Cont'd)
Privacy cont d,
E mail privacy,
Symmetric vs asymmetric cryptography
4  cards
4 - Application-Layer Security (Worms)
What is the difference between vi...,
How to find new worms
2  cards
4 - Application-Layer Security (Botnets)
Internet attacks types,
Internet attacks why and how,
Botnets
16  cards
4 - Application-Layer Security (Web Security)
Explain sql injection,
How to prevent injection attacks,
How a system can store its users ...
15  cards
Exam (by Lersch)
Define passive and active attacks,
Which are the six security services,
How to attack each security services
68  cards

More about
Security

  • Class purpose General learning

Learn faster with Brainscape on your web, iPhone, or Android device. Study Vitor R's Security flashcards now!

How studying works.

Brainscape's adaptive web mobile flashcards system will drill you on your weaknesses, using a pattern guaranteed to help you learn more in less time.

Add your own flashcards.

Either request "Edit" access from the author, or make a copy of the class to edit as your own. And you can always create a totally new class of your own too!

What's Brainscape anyway?

Brainscape is a digital flashcards platform where you can find, create, share, and study any subject on the planet.

We use an adaptive study algorithm that is proven to help you learn faster and remember longer....

Looking for something else?

Security+ Exam
  • 34 decks
  • 787 flashcards
  • 4 learners
Decks: Section 1 Overview To Security, Section 2 Malware, Section 3 Malware Infections, And more!
French
  • 121 decks
  • 6695 flashcards
  • 1288 learners
Decks: Expressions 3, Vocab 68, Vocab 66, And more!
Security +
  • 10 decks
  • 250 flashcards
  • 816 learners
Decks: Practice Test 1, Practice Test 2, Practice Test 3, And more!
Make Flashcards