5.3 cyber security Flashcards

You may prefer our related Brainscape-certified flashcards:
1
Q

Brute-Force Attack

A
  • a trial-and-error method used to crack passwords by trying every possible combination until the correct one is found
  • Can be carried out manually or automatically by software
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Aim of Brute-Force Attack

A

 Steal/view/access data
 Delete data
 Change data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Solution for Brute force attack

A
  • Use stronger passwords with more characters and symbols (strong/complex passwords)
  • Setting a limit for login attempts
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Data Interception

A

This involves stealing data by tapping into a wired or a wireless transmission line

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Data Interception aim

A

steal sensitive information, such as passwords, credit card numbers, or personal data for personal gain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Data Interception is done by Packet Sniffing
HOWWWW? -

A

Uses Packet sniffers to examine packets sent over a line, all the data collected is sent back to the attacker

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

How to prevent data interception?

A

Encryption
strong Passwords
firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What does DDoS stand for?

A

Distributed Denial of Service (DDoS) Attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

DDos definition (4marks)

A
  • A DDoS attack is where multiple computers are used as bots
  • They flood a server with lots of requests at the same time which the server can’t respond to; causing it to crash or become unavailable to users
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Aim of DDos

A

to disrupt the normal functioning of a system or network by denying users access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

How can u prevent a DDoS attack?

A

firewall OR proxy server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Hacking

A

the act of gaining illegal access to a computer system without the user’s permission.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Effect of Hacking (what happens)

A

data can be deleted, passed on, changed or corrupted

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

How to prevent Hacking

A
  1. Firewalls
  2. Strong passwords/ user IDs
  3. Use of anti-hacking software
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Malware

A

Malware is malicious software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

VIrus

A
  • is a malware that attaches itself to a legitimate program or file and then
  • replicates itself to spread to other programs or files on the computer.
  • It can cause damage to the system, including deleting data or damaging hardware and causing it to malfunction
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Where viruses are found and how to prevent them

A
  • On email attachments, infected software or websites.

Prevention:
* run up-to-date virus checkers.
* use a firewall
* use a proxy server
* Dont download unoriginal software,
* dont click on unknown links

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Worms

A
  • is similar to a virus but is a standalone program that can spread and replicate itself over computer networks.
  • takes up storage space
  • with the intention of corrupting the entire network
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

How to prevent worms (1)

A

Run up-to-date anti-virus programs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Difference between worms and viruses

A

Viruses require active hosts and for each end user to initiate the virus, worms dont

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Trojan horse

A

a program that disguises itself as a legitimate program or file, but when installed, it can delete data or damage hardware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

How to prevent trojan horse

A

Very hard as it involves user tricking, so even firewalls and anti-virus software can be useless

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Spyware

A

a software that records all key presses and transmits these to a third-party

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Adware

A

a type of software that displays unwanted advertisements on the computer without the user’s consent. Some of these may contain spyware and some may link to viruses when clicked

25
Q

Ransomware

A
  • Software that stops a user from accessing their computer/data by encrypting the files and demands a ransom (fee) payment to decrypt them.
  • It can cause data loss, and financial damage and disrupt business operations
26
Q

Examples of malware (6)

A
  1. Viruses
  2. Worms
  3. Trojan horse
  4. Spyware
  5. Adware
  6. Ransomware
27
Q

Phishing

A

*Legitimate-looking email sent to user
* encourages user to click a link that directs user to a fake website
* User encouraged to enter personal details into a fake website

28
Q

Aim of phishing

A

to steal sensitive information for personal gain

29
Q

How to prevent Phishing

A
  1. Don’t open links from unknown receivers
  2. Use anti-phishing tools
  3. Block pop-up ads
  4. Have an up-to-date browser
30
Q

Pharming

A

Malicious code is downloaded without users’ knowledge that redirects the user to a fake website where they’re encouraged to enter their personal details

31
Q

How to prevent Pharming

A
  • Using anti-virus software
  • Checking the spelling and the weblink carefully
  • Make sure that the green padlock is present in the URL bar
32
Q

Social Engineering

A

manipulating individuals to gain access to confidential information

33
Q

Common types of social engineering

A
  1. posing as someone else to gain trust or access to sensitive information
  2. Phising/emails
  3. Scareware - done using a pop-up message claiming a computer is infected
  4. Baiting- leaving a malware-infected stick somewhere that a curious person plugs into their computer
34
Q

Cyber security threats (8)

A
  1. Brute force attacks
  2. Phishing
  3. Pharming
  4. DDoS attacks
  5. Malware
  6. Social engineering
  7. Data interception
  8. Hacking
35
Q

Accidental Damage

A
  • Liquids being spilt
  • Software failure- Make sure it is always up to date
  • Pressing delete by mistake
  • Not saving data
  • Not shutting down the computer correctly
36
Q

Access Levels

A

Having Different levels of access for different people

(for example - Only doctors can have access to patient’s data)

37
Q

Anti-Malware

A

prevent and remove malware

38
Q

Examples of anti-malware

A

anti-virus
anti-spyware

39
Q

How does Anti-malware work?

A
  1. scans the computer’s files
  2. If any malware is found, it is quarantined to prevent the spread
  3. The malware is then deleted
40
Q

Authentication

A
  • ensure that only authorised users can access data
  • process of Users Proving Who They Are
  • prevent unauthorised access and protect sensitive data
41
Q

Passwords

A
  1. Strong password should be complex, unique, and not easily guessed
  2. Passwords should be changed regularly
  3. Users should avoid reusing passwords across multiple accounts.
42
Q

How can authentication be done (3)

A
  1. Passwords
  2. Biometrics
  3. Two-step verification
43
Q

Biometrics

A

biological data for authentication by identifying unique physical characteristics of a human such as

  • fingerprints,
  • facial and voice recognition,
  • iris scans.
44
Q

Why is biometric authentication more secure than using passwords?

A
  • A biometric password cannot be guessed
  • It is very difficult to fake a biometric password
  • A biometric password cannot be recorded by spyware
  • A perpetrator cannot shoulder surf to see a biometric password
45
Q

Two-factor authentication

A

requires users to provide two forms of authentication before accessing data, such as a password and a verification code sent to a mobile device

46
Q

What does Two-factor authentication (2FA) do

A

This provides an extra layer of security and reduces the risk of unauthorised access. 2FA is widely used to protect online accounts, such as email or banking.

47
Q

Automating Software Updates

A
  • ensures that software systems are up-to-date with the latest security patches, which helps to prevent security threats
  • important for operating systems and software that are frequently targeted by hackers
48
Q

Communications

A

Checking the spelling and tone of communications is important to prevent phishing attacks

49
Q

URL

A
  • Checking the URL attached to a link is another way to prevent phishing attacks.
  • Hackers often use fake URLs to trick users into visiting fraudulent websites
    —-e.g. http://amaz.on.co.uk/ rather than http://amazon.co.uk/
50
Q

Firewalls

A

Type of hardware or software that stands between the user and external networks. It filters and monitors incoming and outgoing traffic.
blocks unauthorised access

51
Q

Tasks Firewall does

A
  • The user sets criteria for the traffic (this is called the whitelist/blacklist)
  • The firewall will monitor the incoming and outgoing traffic
  • It will accept or reject the traffic based on the criteria and if data does not meet the criteria it rejects it and an alert can be sent to the user
  • It can help prevent hacking and malicious software that could be a threat to the security of the data
52
Q

Privacy Settings

A
  • used to control the amount of personal information that is shared online
  • important measure to prevent identity theft and other forms of online fraud
  • Users should regularly review their privacy settings and adjust them as needed
53
Q

Proxy-Servers

A
  • used to hide a user’s IP address and location, making it more difficult for hackers to track them
  • act as a firewall and can also be used to filter web traffic by setting criteria for traffic
  • Malicious content is blocked and a warning message can be sent to the user
  • divert attack away from the server
  • can stop website from falling into DoS attack
54
Q

Secure Socket Layer (SSL)

A
  • a security protocol which is used to encrypt data transmitted over the internet
  • SSL is widely used to protect online transactions, such as those involving credit card information or other sensitive data
55
Q

Process of SSL

A
  1. – Web browser requests web server to identify itself/view the (SSL) certificate
  2. – the web server sends copy of the (SSL) certificate to the browser and browser checks if SSL certificate is authentic/trustworthy
  3. – sends signal back to webserver that the certificate is authentic/trustworthy
  4. – starts to transmit data once connection is established as secure
    5.- encryption method will be agreed and a session key is generated
  5. – if website is not secure browser will display an open padlock/warning message
56
Q

ad and dis of fingerprint scans

A

ad-
* One of the most developed biometric techniques.
* Very easy to use

dis-
* Very intrusive for some, since it is still related to criminal identification.
* Can make mistakes if the skin is dirty or damaged
(for example, cuts).

57
Q

ad and dis of retina scans

A

ad-
● Very high accuracy.
● No known way to replicate a person’s retina

dis-
● Can be relatively slow to verify a retina scan using stored scans.
● Very expensive to install and set up

58
Q

ad and dis of Face recognition

A

ad-
● Non-intrusive.
● Relatively inexpensive

dis-
● Can be affected by changes in lighting, the person’s hair, change in age, and if the person is wearing glasses

59
Q

ad and dis of Voice recognition

A

ad-
● Verification takes less than five seconds.
● Relatively inexpensive

dis-
● Low accuracy.
● Illness, such as a cold, can change a person’s voice,
making absolute identification difficult or impossible.