Security

Subdecks (2)

Cards (41)

  • Wireless encryption protocols
    • WPA: Wi-Fi Protected Access
    • TKIP: Temporal Key Integrity Protocol
    • AES: Advanced Encryption Standard
    • RADIUS: Remote Authentication Dial-In User Service
    • TACACS+: Terminal Access Controller Access-Control System
  • Social Engineering techniques
    • Phishing
    • Vishing
    • Shoulder surfing
    • Whaling
    • Tailgating
    • Impersonation
    • Dumpster diving
    • Evil twin
  • Threats
    • Denial of service (DoS)
    • Distributed denial of service (DDoS)
    • Zero-day attack
    • Spoofing
    • On-path attack
    • Brute-force attack
    • Dictionary attack
    • Insider threat
    • SQL injection
    • Cross-site scripting (XSS)
  • Malware
    • Virus
    • Worm
    • Trojan Horse
    • Spyware
    • Rootkit
    • Ransomware