3.6 Cyber Security Flashcards
Cyber security
Cyber security consists of the processes, practices and technologies designed to protect networks, computers, programs and data from attack, damage or unauthorised access.
Threats to cyber security
• Social engineering techniques
• Malicious code
• Weak and default passwords
• Misconfigured access rights
• Removable media
• Unpatched and/or outdated software
Social engineering techniques
The art of manipulating people to give up confidential information.
4 types of social engineering techniques
• Blagging
• Phishing
• Pharming
• Shouldering
Blagging
Inventing a scenario to convince people to divulge confidential information.
Phishing
Sending a message (usually email) that pretends to be from a legitimate source. The message normally contains a link that the victim is encouraged to follow. Can be made to appear very realistic.
Pharming
Redirecting users to a fake website by either:
• Changing the hosts file on the client computer or
• Changing compromising (poisoning) the DNS server
Shouldering
Shouldering is looking at someone’s information over their shoulder.
Malicious code
• Wants to harm your computer or systems.
• Wants to steal confidential information.
• Wants to take control of your system and hold you to ransom.
• Is used as a “weapon” to cause damage
How?
• It might be an email with a link you are asked to click on
Malware
Malicious code is also referred to as Malware and refers to a variety of forms of hostile or intrusive software.
You need to know about:
• Computer virus
• Trojans
• Spyware
• Adware
Computer virus
• Its installed without your knowledge, with the purpose of doing harm.
• A virus is a program which infect other programs or data files.
• It is commonly replicated to send onto someone else and It is easily spread if a user innocently sends an infected filed to someone else.
• It is commonly found in email attachments with macros.
Trojans
This is a program which misleads the user into thinking it’s another piece of software which, when run, executes another program.
Spyware
A program which records data such as usernames and passwords on a host system and forwards the information to a third party.
Adware
Code embedded or attached to program files which will persistently show adverts.
Weak and default passwords
Weak:
• 8 characters is considered too weak
• Upper, lower case, numbers, special characters
• Not dictionary words - use initials of a phrase known to you
• Don’t use previous passwords
Default:
• Manufacturers often use the same UN and PW for their hardware eg “admin” and 0000
• Many users do not change the default password
What hardware might this apply too?
• This may become more prevalent as we use more “internet of things” devices