3.6 Cyber Security Flashcards

1
Q

Cyber security

A

Cyber security consists of the processes, practices and technologies designed to protect networks, computers, programs and data from attack, damage or unauthorised access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Threats to cyber security

A

• Social engineering techniques
• Malicious code
• Weak and default passwords
• Misconfigured access rights
• Removable media
• Unpatched and/or outdated software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Social engineering techniques

A

The art of manipulating people to give up confidential information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

4 types of social engineering techniques

A

• Blagging
• Phishing
• Pharming
• Shouldering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Blagging

A

Inventing a scenario to convince people to divulge confidential information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Phishing

A

Sending a message (usually email) that pretends to be from a legitimate source. The message normally contains a link that the victim is encouraged to follow. Can be made to appear very realistic.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Pharming

A

Redirecting users to a fake website by either:
• Changing the hosts file on the client computer or
• Changing compromising (poisoning) the DNS server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Shouldering

A

Shouldering is looking at someone’s information over their shoulder.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Malicious code

A

• Wants to harm your computer or systems.
• Wants to steal confidential information.
• Wants to take control of your system and hold you to ransom.
• Is used as a “weapon” to cause damage

How?
• It might be an email with a link you are asked to click on

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Malware

A

Malicious code is also referred to as Malware and refers to a variety of forms of hostile or intrusive software.

You need to know about:
• Computer virus
• Trojans
• Spyware
• Adware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Computer virus

A

• Its installed without your knowledge, with the purpose of doing harm.
• A virus is a program which infect other programs or data files.
• It is commonly replicated to send onto someone else and It is easily spread if a user innocently sends an infected filed to someone else.
• It is commonly found in email attachments with macros.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Trojans

A

This is a program which misleads the user into thinking it’s another piece of software which, when run, executes another program.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Spyware

A

A program which records data such as usernames and passwords on a host system and forwards the information to a third party.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Adware

A

Code embedded or attached to program files which will persistently show adverts.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Weak and default passwords

A

Weak:
• 8 characters is considered too weak
• Upper, lower case, numbers, special characters
• Not dictionary words - use initials of a phrase known to you
• Don’t use previous passwords

Default:
• Manufacturers often use the same UN and PW for their hardware eg “admin” and 0000
• Many users do not change the default password

What hardware might this apply too?
• This may become more prevalent as we use more “internet of things” devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Misconfigured access right

A

There are four main levels of access rights to data!
• Read-only a user can read data
• Create a user can create new data
• Write a user can make changes to data
• Delete a user can delete data

Misconfigured access rights can cause legislation breaches

What is GDPR? (General data protection regulation)
Data should be kept secure - appropriate technical and organisational measures shall be taken against unauthorised or unlawful processing of personal data and against accidental loss or destruction of, or damage to, personal data.

17
Q

Removable media

A

• Any storage medium that can be removed can be lost or stolen.
• If the data is stolen then personal or confidential information could be given away.
• For an organisation storing data about people, this could be in breach of the Data Protection Act.
• Or the media could contain infected files and malware.

18
Q

Unpatched and/or outdated software

A

• Software can be very complex and can contain security flaws that hackers can take advantage of.
• When a hacker discovers a security flaw in software, they can often use it to gain unauthorised access to a computer system.
• They may also share information about the security flaw with other hackers, or ask for payment for the information.
• Software manufacturers can issue patches to patch up the loophole
• However, this replies upon users installing the updates.
• Some software becomes outdated and the manufacturer will no longer provide patches.
• Many computers are not set up automatically to instal software updates.

19
Q

Penetration testing

A

Penetration testing is the practice of deliberately trying to find security holes in your own systems.
The goal of penetration testing is to:
• Identify the targets of potential attacks
• Identify possible entry points
• Attempt to break in
• Report back the findings

20
Q

White-box and black-box penetration testing?

A

Way to highlight weaknesses in defence:
• White-box penetration testing:
Simulate a malicious insider
• Black-box penetration testing:
Stimulate an external hack or cyber warfare

21
Q

Methods to detect and prevent cyber security threats?

A

• Biometrics
• Password systems
• CAPTCHA
• Email confirmation of users identity
• Automatic software update

22
Q

Authentication

A

Checking that the user is allowed to access content. Some applications use a pin pattern instead of a username and password.

23
Q

Biometric authentication

A

Voice, fingerprint, face or iris recognition can be used to identify individuals.

24
Q

How to set a secure password?

A

• Minimum of eight characters.
• Mixture of numbers, lowercase and uppercase characters.
• Do not include your name or personal details.

25
Q

CAPTCHA

A

‘Completely Automated Public Turing test to tell Computers and Humans apart’
• It prevents spambots from signing up to an Internet Service.
• It uses it for search queries if there has been an excessive number of queries from one IP address.
• The user is required to decipher and type in the text shown in a strolled way unreadable by a computer.
• Sometimes the CAPTCHA can be difficult for a human to decipher.

26
Q

Registering a username and password

A

• When a user signs up for a service, they may be asked to enter a username and password.
• They are also asked to enter their email address.
• If, later on, they forget their password, a reminder can be sent to this email address.

27
Q

E-mail confirmation

A

• Usually, the supplier sends a confirmation email address to the address you supplied.
• This may ask you to enter a verification code included with the email.
• Your registration will not be complete until you reply, with the verification code.
• This ensures that you have the correct email address.

28
Q

Automatic software updates

A

• Many large companies such as Microsoft automatically update your software whenever they make a change to it.
• This could happen on a daily or weekly basis.
• The provider of your anti-virus software may remind you to update your protection if for any reason the automatic update failed.