Case Study Definitions
Case Study 2
Mixed
HL Content 1
HL Content 2
100

A technique used to exploit vulnerabilities by overwriting a buffer's boundary and writing into adjacent memory.

<<Buffer overflow attacks>>

100

Software designed to disrupt, damage, or gain unauthorised access to a computer system.

<<Malware>>

100

actions have the same name but different parameter lists and processes

What is polymorphism?

100

The stack operation that removes the top element.

What is pop()?

100

This term describes a data model defined by its operations rather than its implementation.

What is an Abstract Data Type?

200

A technique where attackers inject malicious scripts into trusted websites, which then run on a user's browser

<<Cross-site scripting (X-SS)>>

200

The process of using tools to identify network topologies, including servers, firewalls, and other devices.

<<Network mapping>>

200

 increased complexity for small problems; unsuited to particular classes of problem

What are problems with OOP approaches?

200

A queue implementation where the last node links back to the first.

What is a circular queue

200

The queue operation that adds an element to the back.

What is enqueue()?

300

The process of creating custom scripts or tools designed to take advantage of specific vulnerabilities in a system.

<<Exploit development>>

300

The use of tools to discover active devices on a network.

Network Scanning

300

speed to completion   information hiding to reduce module dependencies   expertise in narrow fields

What are advantages to working in programming teams

300

This traversal visits the left subtree, then the node, then the right subtree.

what is an inorder traversal?

300

This ADT follows the LIFO principle.

what is a stack

400

An individual who attempts to gain unauthorized access to a computer system.

<<Hacker>>

400

The arrangement of the various elements (links, nodes, etc.) of a computer network.

<<Network topology>>

400

The process of determining the operating system running on a network device.

<<OS detection>>

400

Uses nodes and pointers

what is an dynamic data structure?

400

An ADT that follows FIFO ordering is called this.

What is a queue?

500

A unique numerical label assigned to each device connected to a computer network that uses the Internet Protocol for communication

<<IP address>>

500

Data collected from publicly available sources, such as social media and official records, and then analyzed

<<Open-source intelligence (OSINT)>>

500

A tool used in attempts to discover passwords, often by trying many possibilities.

<<Password cracking tool>>

500

Data and actions are limited to the object they are in

What is encapsulation?

500

This type of ADT stores data in a hierarchical manner, often used in parsing expressions.

What is a tree