3.6 Cyber Security Flashcards

1
Q

L1
1) Define cybersecurity
2) Define network security
3) Define hackers

A

1) Cyber security is the practice of protecting systems, networks, and programs from digital attacks.
2) Network security is any activity designed to protect the usability and integrity of a network and its data by managing access to the network.
3) Hackers: Individuals who will violate computer security for malicious or financial reasons; they may also be known as crackers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

1) What is meant by planting the flag?
2) What is an ethical hacker?
3) What is a hacktivist?

A

1) Planting the flag: Individuals who may seek financial reward for finding vulnerability, but are more interested in finding vulnerabilities than gaining something for themselves.
2) Ethical hackers: Individuals whose activities are designed to test and enhance computer security
3) Hacktivists: Individuals who use technology to announce a social, ideological, religious, or political message.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

L2
1) Define social engineering
2) Define blagging
3) Define phishing

A

1) Social engineering is a set of methods used by cyber criminals to deceive individuals into handing over information that they can use for fraudulent purposes.
2) Blagging is where a victim is tricked or persuaded by a fraudster to give their personal details or payment information for a false reason (a scenario is created by fraudster).
3) Phishing is where the victim receives and responds to a communication that appears to be from a valid or known source but is in fact fraudulent. This allows the fraudster to get private information before the victim realises.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

L2
1) Define shouldering
2) Define tailgaiting
3) Define eavesdropping
4) Define pharming

A

1) Shouldering (also known as shoulder surfing) is an attack designed to steal a victim’s password or other sensitive data. It involves the attacker watching the victim while they provide sensitive information, for example, over their shoulder.
2) Tailgating is a physical security breach in which an unauthorised person follows an authorised individual to enter secured premises.
3) Eavesdropping is a technique that involves the social engineer being physically present to overhear confidential conversations.
4) Pharming redirects victims to a bogus site, even if the victim has typed in the correct web address.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

L3
1) Define malware
2) Define viruses
3) Define worms

A

1) Malware (malicious software) is software that is designed to gain access to your computer with malicious intent.
2) Viruses are a malicious form of self-replicating software. Once on a computer or network, a virus will replicate itself by maliciously modifying other computer programs and inserting code.
3) Worms replicate themselves, but do not attach themselves to files. Instead, worms spread through the network and use the system’s resources.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

L3
1) Define trojan
2) Define ransomware
3) Define spyware

A

1) A trojan is a piece of software that appears to perform a useful function. However, unbeknown to the user, it also performs malicious actions.
2) Ransomware locks a computer, encrypts files, and therefore prevents the user from been able to access the data. The attacker will demand that a ransom be paid before they decrypt the files and unlock the computer.
3) Spyware is unwanted software that monitors and gathers information on a person and how they use their computer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

L3
1) Define adware
2) Define exploit
3) What is a data breach?

A

1) Adware refers to software that has advertisements embedded in the application. It is not always a bad thing and is considered a legitimate alternative offered to consumers who do not wish to pay for software.
2) An exploit is code that takes advantage of a system, application, or any other software code.
3) A data breach is a security incident in which sensitive, protected, or confidential data is copied, transmitted, viewed, stolen, or used by an individual who is not authorised to do so. It is also known as data interception.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

L3
1) Define denial of service attack
2) Define distributed denial of service attack
3) Define a zombie

A

1) A denial of service attack (DoS attack) is a cyberattack in which a criminal makes a network resource unavailable to its intended users by flooding the targeted machine or website with lots of requests in an attempt to overload systems and prevent some or all legitimate requests from being fulfilled.
2) In a distributed denial of service attack (DDoS attack), the incoming traffic flooding the victim originates from many different sources. This makes it impossible to stop the attack simply by blocking a single source.
3) A computer connected to the internet that has been compromised by a hacker, computer virus, or Trojan horse program and can be used to perform malicious tasks under remote direction.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

L3
1) Define brute force
2) Define SQL injection

A

1) This type of attack can occur when an attacker systematically submits guessed passwords with the hope of eventually guessing correctly.
2) SQL injection occurs when malicious SQL statements are inserted into an entry field for execution (e.g. to dump the database contents to the attacker).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

L4
1) What is encryption?
2) What is an encryption key?
3) What is asymmetric encryption?

A

1) Encryption is the process of encoding data or a message so that it cannot be understood by anyone other than its intended recipient
2) An encryption key is a piece of information, usually random characters, used by a software algorithm to encrypt data or a message into a form that is unreadable (encryption) and allow the data or message to be made readable again (decryption)
3) Asymmetric encryption that uses two keys: a public key and a private key.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

L4
1) What is symmetric encryption?
2) What is modular testing?
3) What is input sanitation?

A

1) Symmetric encryption, uses just one key to hide and read a message.
2) Modular testing is testing that checks individual subprograms, subroutines, classes, or procedures in a program.
3) Input sanitation is including code that removes any SQL commands from the input data, preventing a hacker from gaining control of a database.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

L4
1) What are are code reviews?
2) Explain how hacking can occur through the use of passwords
3) What is two factor authentication?

A

1) Plans to review and test code in an attempt to discover vulnerabilities in programs before cybercriminals find them.
2) Hackers have databases of commonly used or poor passwords that they can use as part of a brute-force attack. A weak password makes it easy for someone to guess your login details.
3) 2FA is an additional layer of security you can add to many of your online accounts.
2FA methods might include being sent a unique code via text message or email. Alternatively, you might have to provide biometrics, such as a fingerprint.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

L5
1) What is a firewall?
2) What is packet filtering?
3) What is proxy service?

A

1) A firewall sits between a local network or computer and another network, controlling the incoming and outgoing network traffic.
2) Packet filtering: packets (small chunks of data) are analysed against a set of filters. Packets that make it through the filters are sent to the requesting system, and all others are discarded.
3) Proxy service: information from the internet is retrieved by the firewall and then sent to the requesting system, and vice versa.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

L5
1) What is a MAC address?
2) Explain how MAC address filtering works.
3) What is a MAC address white list?

A

1) A unique identifier that is used as a network address in communications within a network.
2) MAC address filtering limits the devices that can access a network, either including or excluding specific devices by using their unique MAC address.
Each device connected to the network have a unique physical address, called the MAC address. There is a list of allowed addresses. The network device or router looks at the address of the device trying to connect to the network, and allows or blocks them.
3) MAC addresses permitted to access a network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

L5
1) What is a MAC address black list?
2) What is antivirus software?
3) What is an acceptable use policy?

A

1) MAC addresses banned from a network
2) Software that is designed to detect and block attacks from malware. Some operating systems have their own inbuilt antivirus software.
3) States how the network may be used, including what is and is not acceptable, e.g. online shopping or gambling

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

L5
1) What is an archiving policy?
2) What is a network policy?
3) What is a disaster recovery policy?

A

1) A policy that determines how long data can be kept for.
2) A network policy usually contains both an archiving policy and an acceptable use policy.
3) A policy that allows an organisation to resume business quickly during or after a disaster, which could include a cyberattack.

17
Q

L6
1) What is penetration testing (pen test)?
2) What are network forensics?
3) What is the white box pen test?

A

1) Penetration testing is a type of security testing that is used to test for insecure areas of a system or application.
2) The monitoring and analysis of computer network traffic for information gathering and intrusion detection.
3) Testing in which the tester has full knowledge — more like a malicious insider.

18
Q

L6
1) What is the grey box pen test?
2) What is the black box pen test?

A

1) Testing in which the tester has some knowledge — a compromise between a white and black box pen test.
2) Testing in which the tester has no knowledge — more like an external hacker.