5 issues and impact cyber security Flashcards

1
Q

what is malware

A
  • malicious software
  • a variety of forms of intrusive software to gain unauthorised access to files
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

what is cyber security

A

the processes and various technologies designed to protect computers from damage or unauthorised access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

what malware can threat cyber security

A
  • Virus
  • Worm
  • Trojan
  • Ransomware
  • Keyloggers
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

what is a virus

A

a code that can replicate itself onto other programs and infect other computers to corrupt, delete or modify files

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

what is a worm

A

malware that replicates itself to infect computers to slow down networks and computers, though they might not cause damage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

what is a trojan horse

A

malware that disguises itself as a useful program and downloads itself on a computer which can take control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

what is ransomware

A

it prevents a user from accessing their files or computer until a certain amount of money is paid to the hacker

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

what is a keylogger

A

a small device that records keystrokes and is put online or on a document for the hacker

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

what are the two main ways malware can make itself onto a computer

A
  • unpatched software
  • out of date anti-malware
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

explain unpatched software

A

when updates and security are not installed causing vulnerable software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

explain out of date anti-malware

A

when the software isn’t regularly updated so it can’t detect the latest viruses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

what is baiting

A

people with malicious intent promising cash or goods to entice victims

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

what is social engineering

A

the ability to obtain confidential information by asking for it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

give two examples of social engineering

A
  • blagging
  • phishing
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

explain phishing

A

sending emails/messages as reputable companies to incite people to reveal personal information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

explain Quid pro quo

A

‘something for something’, promising a benefit in exchange for information

17
Q

what is Antimalware

A

software that detects malware and prevents it from damaging computers

18
Q

what is encryption

A

encrypted files that have been altered using a code that are unreadable to unauthorised parties

19
Q

what does AUP stand for

A

acceptable use policy

20
Q

name the three types of backups companies use for data

A
  • RAID
  • external off site backups
  • cloud backups (online)
21
Q

name three things that can happen in a workplace while data is recovering

A
  • alternative computers
  • use mobile wifi
  • use paper systems
22
Q

what does raid stand for

A

redundant array of independent disks

23
Q

name two different ways about the occasion of backups

A
  • weekly/daily
  • incremental
24
Q

what is incremental

A

only backed up when updates are made

25
Q

true or false: external backups are usually stored in a different location

A

true

26
Q

true or false: external backups are usually stored in the same location

A

false

27
Q

explain AUP

A

enforced by legal and company action for IT use

28
Q

give examples of AUP (4)

A
  • internet use
  • email use
  • password policy
  • locking computers
29
Q

name conditions usually used in password policies (4)

A
  • minimum length
  • some lowercase
  • some uppercase
  • one symbol
30
Q

explain blagging

A

creating an invented scenario to engage a targeted victim to increase the chance of divulging information