07 - Cyber Security Flashcards

You may prefer our related Brainscape-certified flashcards:
1
Q

define cybersecurity

A

processes or technologies designed to protect networks/computers or programs from attack, damage, or unauthorised access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

what is a brute force attack (passwords)

A

guessing the password manually until you get access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

why is social engineering preferred by cyber criminals compared to hacking a system?

A

as it is easier, and people are the ‘weakest’ link

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

define a cyber threat

A

any threat to a computer system from an internet source

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

define hacktivism

A

the act of hacking or breaking into a computer system for politically or socially motivated purposes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

what is the aim of hacktivists?

A
  • to promote their view of thinking/cause

- to challenge organisations/companies who are against their pov

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

define social engineering

A

the art of manipulating individuals to break security procedures to give information away

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

what is blagging?

A

creating an invented scenario to engage targeted victim to directly give away information (passwords)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

give an example of blagging

A

an employee is called and asked for login details and password to fix a security bug, they give it away, system is hacked

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

what is phishing?

A

sending emails (pretending to be a genuine company), to gain personal details

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

what are signs of a phishing email?

A
  • spelling errors/ bad grammar
  • informal writing
  • impersonal (dear customer)
  • deadline (if you don’t do this then account closes)
  • email is unrealistic
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

what is pharming?

A

when your computer has been infected so it changes valid hyperlinks to malicious websites

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

how can you be directed to a pharming website?

A
  • modifying certain files

- hacking domain name server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

what is shouldering?

A

direct observation of a user entering their security details (passwords/pins)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

what is another word for shouldering?

A

shoulder surfing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

define malware

A

software that is designed to disrupt or harm a user’s computer

17
Q

what does a virus do?

A
  • self-replicates
  • cause damage to computer system by corrupting data
  • or using all available memory
18
Q

what does a trojan horse do?

A
  • disguised as harmless file/download
  • malware loaded with download
  • attack performed once downloaded
19
Q

describe spyware

A

(computer program)

  • gathers data about people without knowledge
  • records key pressers on computer (can gather passwords/ usernames)
20
Q

describe adware

A
  • inject adverts to websites/ programs on computer
  • aim that the creator would generate advertising revenue
  • not usually too bad (but can contain worse malware like viruses and spyware)
21
Q

how do you prevent threats from downloaded software?

A
  • have anti-virus software

- only download from a reputable source

22
Q

what is penetration testing?

A

finding out whether there are any security vulnerabilities in a network or system by stimulating potential attacks and reporting vulnerabilities

23
Q

which kind of penetration testing has knowledge of the internals of the system?

A

white box testing

24
Q

what is the role of white box testing?

A

to stimulate an attack from someone with detailed insider knowledge of the system (rogue employee)

25
Q

what is the aim of black box testing?

A

go stimulate a full-on cyber warfare attack

26
Q

what kind of penetration testing does not have any knowledge of the system?

A

black box testing

27
Q

what is black-box testing used to stimulate?

A

full on cyberwardare attack (flood servers with more requests they can handle)

28
Q

what is a denial of service attack?

A

flooding the servers with more requests they can handle

29
Q

state examples of biometric authentication

A

fingerprints, iris scanning, facial recognition,

30
Q

how can an authentication system add extra security?

A

two-factor authentication

31
Q

what are email confirmations used for?

A
  • ensure person signed up is using a valid email address

- prevent unnecessary strain on the computer’s servers (mass signing up)

32
Q

what is CAPTCHA for?

A
  • stop bots from automatically signing up to a website and overloading the server
33
Q

what is an alternative to penetration testing?

A

automatic software updates (software is updated every time a new vulnerability is detected) - instead of right at the start

34
Q

what is the point of a virus?

A
  • slow down computer

- consume memory usage

35
Q

what is the aim of spyware?

A

steal your passwords