# Computer Security
## Types of Attacks
| Type | Description |
| ---------------- | ----------- |
| Flooding Attacks | |
| Intrusion | |
## The Security of Software
## Practice Quiz Notes
- Network-based intrusion detection makes use of signature detection and anomaly detection.
- A good technique for choosing a password is to use the first letter of each word of a phrase
- An auditing function monitors and keeps a record of user accesses to system resources.
- At the basic machine level, all of the data manipulated by machine instructions executed by the computer processor are stored in either the processor’s registers or in memory.
- Software security is closely related to software quality and reliability.
- Many computer security vulnerabilities result from poor programming practices.
- The default set of rights should always follow the rule of least privilege or read-only access.
- Security flaws occur as a consequence of insufficient checking and validation of data and error codes in programs.
- Running a packet sniffer on a workstation to capture usernames and passwords is an example of intrusion
- Flooding attacks take a variety of forms based on which network protocol is being used to implement the attack.
- Defensive programming is sometimes referred to as secure programming
- RFC 4949 defines user authentication as “the process of verifying an identity claimed by or for a system entity”.
- Issued as RFC 2104, HMAC has been chosen as the mandatory-to-implement MAC for IP security.
- HMAC can be proved secure provided that the embedded hash function has some reasonable cryptographic strengths.
- The privilege management component deals with the management and control of the ways entitites are granted access to resources
- A denial-of-service attack is an attempt to compromise availability by hindering or blocking completely the provision of some service.
- The one-way hash function is important not only in message authentication but also in digital signatures.
- A(n) {poison packet} triggers a bug in the system’s network handling software causing it to crash and the system can no longer communicate over the network until this software is reloaded.
- The buffer overflow type of attack has been known since it was first widely used by the {Morris Internet} Worm in 1988.