5.3 - Cyber Security Flashcards

You may prefer our related Brainscape-certified flashcards:
1
Q

What are brute force attacks? [3]

A
  • type of cyber security attack
  • tries to guess a password or encryption key
  • does this by trying every possible combination of characters
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is data interception? [3]

A
  • type of cyber security attack
  • steals data as it’s being transmitted between 2 computers
  • uses packet sniffing
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is packet switching? [3]

A
  • cybercriminals examine data packets being sent over a network using this
  • it find the contents of the data packet
  • it is then sent back to the cybercriminal
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are DDOS attacks? [3]

A
  • type of cyber security attack
  • floods websites and servers with internet traffic
  • this prevents users from accessing online services and sites
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is botnet? [2]

A

network of compromised computers controlled by hacker

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is hacking? [3]

A
  • type of cyber security attack
  • they get illegal access to computer system
  • without the user’s permission
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is ethical hacking? [3]

A
  • legal hacking
  • used to fix flaws of computer systems and networks
  • gains access to them
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What does DDOS stand for? [4]

A

Distributed Denial of Service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is malware? [3]

A
  • programs installed on a user’s computer
  • aims to delete, corrupt, or manipulate data illegally
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are the 6 types of malware? [6]

A
  • virus
  • worms
  • trojan horse
  • spyware
  • adware
  • ransomware
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is a virus? [3]

A
  • programs copy themselves
  • causes computer to malfunction
  • requires an active host in the computer before causing damage
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is a worm? [3]

A
  • stand alone malware
  • can corrupt whole networks
  • doesn’t need an active host
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What do worms come as? [1]

A

message attachments

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is a trojan horse? [3]

A
  • program disguised as legitimate
  • has to be executed by user
  • after installing it = access to user’s personal information
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What does a trojan horse come as? [1]

A

email

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is spyware? [3]

A
  • software that monitors user’s activities on computer
  • gathers unformation
  • sends back to cybercriminal
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is adware? [3]

A
  • floods device with unwanted ads
  • some could be safe
  • some might steal your data
18
Q

What is ransomware? [3]

A
  • holds PC hostage
  • demands money
  • demands payment for the release of your data files
19
Q

What is phishing? [3]

A
  • gets you to click on harmful links via email, texts and phone calls
  • links lead to fake websites that look real
  • login credentials = hacker steals it
20
Q

What does phishing use? [3]

A
  • emails
  • texts
  • phone calls
21
Q

What do phishing sources often be like? [3]

A
  • appear to be from a trusted source
  • create a sense of urgency
  • contain grammatical errors or typos
22
Q

What is pharming? [3]

A
  • changes your computer’s settings
  • changes DNS system
  • makes it so that it automatically redirects you to a harmful site
23
Q

How can pharming occur? [2]

A
  • infecting your computer with malware
  • by compromising a DNS server
24
Q

What is social engineering? [2]

A
  • psychological manipulation
  • tricks you into revealing information or taking actions you wouldn’t usually take
25
Q

What do social engineers use? [3]

A
  • impersonation
  • urgency and fear
  • scarcity and opportunity
26
Q

What are access levels? [3]

A
  • different levels of access in a computer system
  • which gives a hierarchy of access levels
  • which depends on the user’s level of security
27
Q

What are the two types of anti-malware? [2]

A
  • anti-virus
  • anti-spyware
27
Q

What is anti-malware? [1]

A
  • can detect and remove malware
28
Q

What is anti-virus? [2]

A
  • constantly checks for virus attacks
  • checks computer before it runs/loads
29
Q

What is anti-spyware? [2]

A
  • software that detects and removes spyware programs
  • which are illegally installed on a computer system
30
Q

What is authentication? [2]

A
  • the ability of a user to prove who they are
31
Q

What are the 3 common factors of authentication? [3]

A
  • something you know (PIN code)
  • something you have (mobile phone)
  • something which is unique to you (biometrics)
32
Q

What are biometrics? [2]

A
  • type of authentication
  • uses unique human characteristics
33
Q

What are examples of biometrics? [4]

A
  • fingerprint scans
  • retina scans
  • face recognition
  • voice recognition
34
Q

What is two-step verification? [2]

A
  • extra layer of security
  • by requiring a second form of verification
35
Q

What are automatic software updates? [2]

A
  • softwares on computers and mobile phones are kept up to date
  • done overnight sometimes
36
Q

What are firewalls? [3]

A
  • software or hardware
  • sits between computer and external network
  • monitors and filters all incoming and outgoing traffic
37
Q

What are privacy settings? [1]

A
  • allows users to control who see theirs information
38
Q

What are proxy servers? [2]

A
  • adds a layer of security and privacy
  • companies use them to control and ease the flow of internet traffic
39
Q

What is SSL? [2]

A
  • encrypts data between user and server
  • having an SSL certificate authenticates that the data exchange is secure
40
Q

What does SSL stand for? [3]

A

Secure Socket Layer

41
Q

If it has HTTPS in its web address, what does it mean? [1]

A

The site has an SSL certificate and is therefore secured