3.6 Cyber Security - Threats Flashcards

1
Q

What is the definition of ‘cyber security’?

A

Cyber security refers to the ways in which organisations and individuals can defend computers, systems, networks, programs and data from malicious attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is social engineering?

A

This is art of manipulating individuals into sharing confidential personal information such as passwords.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Name 4 types of social engineering.

A

Phishing, pharming, shouldering, blagging.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is malware?

A

Malware is short for ‘malicious software’ and is a term that refers to software which is designed to be harmful to a computer or system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Name 3 types of malware

A

Virus, Trojan, Spyware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the difference between a virus and a Trojan?

A

A virus can hard your computer, for example, by deleting or altering files. A Trojan pretends to be a trusted file but can give unauthorised access to a computer when it is run.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Why is a weak or default password a cyber security threat?

A

Using a weak password/default password means that it can easily be guessed or found in a brute force attack.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is a brute force attack?

A

This uses trial and error to find passwords, log in details or encryption keys. The weaker these are, the easier it is to find these in a brute force attack.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Explain what is meant by misconfigured access rights.

A

This is when user accounts have incorrect permissions giving them access to information they should not have, e.g. employee details.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Give 2 examples of removable media.

A

USB memory sticks, SD cards, external hard drives.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are the cyber security dangers of using removable media?

A

Malware could be transferred from the removable device to the computer system. Also, if lost, sensitive data could be taken by others.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are the dangers of using unpatched or out of data software?

A

Some bugs can give hackers the opportunity to steal data or access a system so the ‘patch’ (piece of code) will prevent this happening. Out of data software may not be supported which means that if there are bugs there will be patch.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly