CS345 Study Materials: Intro to Information Security & Command Line Skills Flashcards
Master CS345 Study Materials: Intro to Information Security & Command Line Skills with these flashcards. Review key terms, definitions, and concepts using active recall to strengthen your understanding and ace your exams.
Swipe to navigate between cards
Front
CIA triad
Back
Confidentiality, Integrity, and Availability are core security goals used to reason about protection needs. They are important but do not fully encompass the breadth of computing in the presence of adversaries.
Front
Adversarial computing
Back
Computing in the presence of adversaries means designing and operating systems assuming hostile actors will try to exploit weaknesses. This perspective expands beyond CIA to include social, physical, and embedded attack surfaces.
Front
National Vulnerability Database
Back
The NVD catalogs known software vulnerabilities and their metadata, and shows large yearly counts of reported issues (tens of thousands per year). It demonstrates the scale and continual growth of discovered flaws.
Front
Common attack types
Back
Attacks include social engineering, man-in-the-middle, and distributed denial-of-service among many others. Defenders must consider how attacks work, what they target, and possible mitigations across varied domains.
Front
Embedded systems
Back
Embedded systems run specialized software on devices like thermostats or cameras and may lack typical protections. Even non-networked devices can be denied service or abused through software bugs or physical interactions.
Front
IP address format
Back
An IPv4 address is commonly written as A.B.C.D with each of the four octets between 0 and 255. In many contexts, an IP address serves as a practical unique name for a host.
Front
Bit and byte
Back
A bit is a binary value 0 or 1; eight bits form a byte. All digital data is ultimately represented as sequences of bits and bytes, and higher-level meaning is assigned by software.
Front
Nibble
Back
A nibble is 4 bits, half of a byte, and conveniently maps to a single hexadecimal digit. It is useful for grouping bits when converting between binary and hex.
Front
Byte as number
Back
A single byte interpreted as an unsigned integer ranges from 0 to 255 using base-2 positional weights. Multi-byte sequences combine bytes to represent larger integers using agreed conventions.
Front
Hex and octal
Back
Hex (base 16) and octal (base 8) are compact human-friendly ways to write binary, grouping bits into 4 (hex) or 3 (octal). Programming literals often use prefixes like 0x for hex and a leading 0 for octal.
Front
ASCII
Back
ASCII is a 7-bit character encoding mapping values 0–127 to control and printable characters. Extended 8-bit encodings and Unicode address multilingual needs, but 7-bit ASCII remains the core for control vs printable separation.
Front
Everything is a file
Back
In Unix-like systems most resources are represented as files: regular files, directories, devices, and sockets. This unifying model makes tools and permissions apply consistently across many resource types.
Front
Absolute vs relative paths
Back
An absolute path starts at the root '/' and names a file regardless of current directory; a relative path is interpreted from the current working directory. Use absolute paths for fixed references and relative paths for local navigation.
Front
Working directory
Back
The current working directory is where command-line commands operate by default; use pwd to print it and cd to change it. Many relative path operations depend on the working directory.
Front
File meta-data
Back
Files have metadata such as owner, group, size, times, and permissions that are distinct from their byte contents. This information affects access control and auditing.
Front
Unix permissions
Back
Unix permissions separate access into owner, group, and world with read, write, and execute bits for each. chmod sets these bits often using octal notation like chmod 754 to specify owner/group/world modes.
Front
Basic file commands
Back
Core command-line operations include ls for listing, cat for printing files, cp for copying, rm and rm -r for removal, and mkdir/rmdir for directories. Text editors like nano and vi let you create or edit files on the command line.
Continue learning
Explore other study materials generated from the same source content. Each format reinforces your understanding of CS345 Study Materials: Intro to Information Security & Command Line Skills in a different way.
Create your own flashcards
Turn your notes, PDFs, and lectures into flashcards with AI. Study smarter with spaced repetition.
Get Started Free