5 issues and impact cyber security Flashcards
what is malware
- malicious software
- a variety of forms of intrusive software to gain unauthorised access to files
what is cyber security
the processes and various technologies designed to protect computers from damage or unauthorised access
what malware can threat cyber security
- Virus
- Worm
- Trojan
- Ransomware
- Keyloggers
what is a virus
a code that can replicate itself onto other programs and infect other computers to corrupt, delete or modify files
what is a worm
malware that replicates itself to infect computers to slow down networks and computers, though they might not cause damage
what is a trojan horse
malware that disguises itself as a useful program and downloads itself on a computer which can take control
what is ransomware
it prevents a user from accessing their files or computer until a certain amount of money is paid to the hacker
what is a keylogger
a small device that records keystrokes and is put online or on a document for the hacker
what are the two main ways malware can make itself onto a computer
- unpatched software
- out of date anti-malware
explain unpatched software
when updates and security are not installed causing vulnerable software
explain out of date anti-malware
when the software isn’t regularly updated so it can’t detect the latest viruses
what is baiting
people with malicious intent promising cash or goods to entice victims
what is social engineering
the ability to obtain confidential information by asking for it
give two examples of social engineering
- blagging
- phishing
explain phishing
sending emails/messages as reputable companies to incite people to reveal personal information
explain Quid pro quo
‘something for something’, promising a benefit in exchange for information
what is Antimalware
software that detects malware and prevents it from damaging computers
what is encryption
encrypted files that have been altered using a code that are unreadable to unauthorised parties
what does AUP stand for
acceptable use policy
name the three types of backups companies use for data
- RAID
- external off site backups
- cloud backups (online)
name three things that can happen in a workplace while data is recovering
- alternative computers
- use mobile wifi
- use paper systems
what does raid stand for
redundant array of independent disks
name two different ways about the occasion of backups
- weekly/daily
- incremental
what is incremental
only backed up when updates are made
true or false: external backups are usually stored in a different location
true
true or false: external backups are usually stored in the same location
false
explain AUP
enforced by legal and company action for IT use
give examples of AUP (4)
- internet use
- email use
- password policy
- locking computers
name conditions usually used in password policies (4)
- minimum length
- some lowercase
- some uppercase
- one symbol
explain blagging
creating an invented scenario to engage a targeted victim to increase the chance of divulging information