5.3 - Cyber Security Flashcards
What are brute force attacks? [3]
- type of cyber security attack
- tries to guess a password or encryption key
- does this by trying every possible combination of characters
What is data interception? [3]
- type of cyber security attack
- steals data as it’s being transmitted between 2 computers
- uses packet sniffing
What is packet sniffing? [3]
- cybercriminals examine data packets being sent over a network using this
- it find the contents of the data packet
- it is then sent back to the cybercriminal
What are DDOS attacks? [3]
- type of cyber security attack
- floods websites and servers with internet traffic
- this prevents users from accessing online services and sites
What is botnet? [2]
network of compromised computers controlled by hacker
What is hacking? [3]
- type of cyber security attack
- they get illegal access to computer system
- without the user’s permission
What is ethical hacking? [3]
- legal hacking
- used to fix flaws of computer systems and networks
- gains access to them
What does DDOS stand for? [4]
Distributed Denial of Service
What is malware? [3]
- programs installed on a user’s computer
- aims to delete, corrupt, or manipulate data illegally
What are the 6 types of malware? [6]
- virus
- worms
- trojan horse
- spyware
- adware
- ransomware
What is a virus? [3]
- programs copy themselves
- causes computer to malfunction
- requires an active host in the computer before causing damage
What is a worm? [3]
- stand alone malware
- can corrupt whole networks
- doesn’t need an active host
What do worms come as? [1]
message attachments
What is a trojan horse? [3]
- program disguised as legitimate
- has to be executed by user
- after installing it = access to user’s personal information
What does a trojan horse come as? [1]
What is spyware? [3]
- software that monitors user’s activities on computer
- gathers unformation
- sends back to cybercriminal
What is adware? [3]
- floods device with unwanted ads
- some could be safe
- some might steal your data
What is ransomware? [3]
- holds PC hostage
- demands money
- demands payment for the release of your data files
What is phishing? [3]
- gets you to click on harmful links via email, texts and phone calls
- links lead to fake websites that look real
- login credentials = hacker steals it
What does phishing use? [3]
- emails
- texts
- phone calls
What do phishing sources often be like? [3]
- appear to be from a trusted source
- create a sense of urgency
- contain grammatical errors or typos
What is pharming? [3]
- changes your computer’s settings
- changes DNS system
- makes it so that it automatically redirects you to a harmful site
How can pharming occur? [2]
- infecting your computer with malware
- by compromising a DNS server
What is social engineering? [2]
- psychological manipulation
- tricks you into revealing information or taking actions you wouldn’t usually take
What do social engineers use? [3]
- impersonation
- urgency and fear
- scarcity and opportunity
What are access levels? [3]
- different levels of access in a computer system
- which gives a hierarchy of access levels
- which depends on the user’s level of security
What are the two types of anti-malware? [2]
- anti-virus
- anti-spyware
What is anti-malware? [1]
- can detect and remove malware
What is anti-virus? [2]
- constantly checks for virus attacks
- checks computer before it runs/loads
What is anti-spyware? [2]
- software that detects and removes spyware programs
- which are illegally installed on a computer system
What is authentication? [2]
- the ability of a user to prove who they are
What are the 3 common factors of authentication? [3]
- something you know (PIN code)
- something you have (mobile phone)
- something which is unique to you (biometrics)
What are biometrics? [2]
- type of authentication
- uses unique human characteristics
What are examples of biometrics? [4]
- fingerprint scans
- retina scans
- face recognition
- voice recognition
What is two-step verification? [2]
- extra layer of security
- by requiring a second form of verification
What are automatic software updates? [2]
- softwares on computers and mobile phones are kept up to date
- done overnight sometimes
What are firewalls? [3]
- software or hardware
- sits between computer and external network
- monitors and filters all incoming and outgoing traffic
What are privacy settings? [1]
- allows users to control who see theirs information
What are proxy servers? [2]
- adds a layer of security and privacy
- companies use them to control and ease the flow of internet traffic
What is SSL? [2]
- encrypts data between user and server
- having an SSL certificate authenticates that the data exchange is secure
What does SSL stand for? [3]
Secure Socket Layer
If it has HTTPS in its web address, what does it mean? [1]
The site has an SSL certificate and is therefore secured