3.6 Fundamentals Of Cyber Security Flashcards
Cyber security definition:
= the technologies, practices and processes used to protect networks, data, programs & computers against damage, cyber attacks & unauthorised access
List the cyber security threats:
- social engineering techniques
- malicious code
- weak and default passwords
- misconfigured access rights
- removable media
- unpatched and/or outdated software
Social engineering techniques:
-
Malicious code
web scripts designed to create system vulnerabilities in order to upload malware
(leading to back doors, security breaches, information and data theft, and other potential damages to files and computing systems)
Weak and default passwords
- big security risk as can be easily cracked
hackers use: - brute force attacks to get past short/simple passwords easily
- social engineering to figure out commonly used passwords (birthdays/addresses)
Misconfigured access rights
Users being given access to info they should not have access to
Explain removable media:
- malware can get onto device by being hidden in removable media
Unpatched and/or outdated software
- could be more easily exploited by hackers, malware, viruses
Penetration testing definition:
= process of attempting to gain access to resources without knowledge of usernames, passwords and other normal means of access
= when organisations employ specialists to stimulate potential attacks to their system to identify possible weaknesses in their cyber security
what does White-box penetration testing do?
= simulates a malicious insider who has knowledge of the target system (employee)
(Given some credentials)
what does Black-box penetration testing do?
= simulates an external hacking/cyber warfare attack, (not given any credentials)
Social engineering definition:
= art of manipulating people so they give up confidential information (of networks)
List the forms of social engineering:
- pharming
- phishing
- shouldering (shoulder surfing)
- blagging
What is pharming?
Cyber attack intended to redirect a websites traffic to another, fake site using malware
- fake site designed to look the exact same
- user will enter personal info which will be taken by the criminal
Reduce risk by ensuring anti-malware software up-to-date
What is Phishing?
Technique of fraudulently obtaining private info, often using email/SMS
- criminals send emails/texts to people claiming to be a well-known business (bank), often lead to fake websites
Reduce risk = many email programs, browsers, firewalls have anti-phishing features (reduces amount of phishing emails received),
other giveaways = poor grammar, urgency, unknown email address,
Be cautious around emails asking to follow links/update personal details