5.3 - Cyber Security Flashcards

1
Q

What are brute force attacks? [3]

A
  • type of cyber security attack
  • tries to guess a password or encryption key
  • does this by trying every possible combination of characters
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is data interception? [3]

A
  • type of cyber security attack
  • steals data as it’s being transmitted between 2 computers
  • uses packet sniffing
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is packet sniffing? [3]

A
  • cybercriminals examine data packets being sent over a network using this
  • it find the contents of the data packet
  • it is then sent back to the cybercriminal
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are DDOS attacks? [3]

A
  • type of cyber security attack
  • floods websites and servers with internet traffic
  • this prevents users from accessing online services and sites
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is botnet? [2]

A

network of compromised computers controlled by hacker

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is hacking? [3]

A
  • type of cyber security attack
  • they get illegal access to computer system
  • without the user’s permission
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is ethical hacking? [3]

A
  • legal hacking
  • used to fix flaws of computer systems and networks
  • gains access to them
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What does DDOS stand for? [4]

A

Distributed Denial of Service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is malware? [3]

A
  • programs installed on a user’s computer
  • aims to delete, corrupt, or manipulate data illegally
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are the 6 types of malware? [6]

A
  • virus
  • worms
  • trojan horse
  • spyware
  • adware
  • ransomware
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is a virus? [3]

A
  • programs copy themselves
  • causes computer to malfunction
  • requires an active host in the computer before causing damage
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is a worm? [3]

A
  • stand alone malware
  • can corrupt whole networks
  • doesn’t need an active host
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What do worms come as? [1]

A

message attachments

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is a trojan horse? [3]

A
  • program disguised as legitimate
  • has to be executed by user
  • after installing it = access to user’s personal information
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What does a trojan horse come as? [1]

A

email

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is spyware? [3]

A
  • software that monitors user’s activities on computer
  • gathers unformation
  • sends back to cybercriminal
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is adware? [3]

A
  • floods device with unwanted ads
  • some could be safe
  • some might steal your data
18
Q

What is ransomware? [3]

A
  • holds PC hostage
  • demands money
  • demands payment for the release of your data files
19
Q

What is phishing? [3]

A
  • gets you to click on harmful links via email, texts and phone calls
  • links lead to fake websites that look real
  • login credentials = hacker steals it
20
Q

What does phishing use? [3]

A
  • emails
  • texts
  • phone calls
21
Q

What do phishing sources often be like? [3]

A
  • appear to be from a trusted source
  • create a sense of urgency
  • contain grammatical errors or typos
22
Q

What is pharming? [3]

A
  • changes your computer’s settings
  • changes DNS system
  • makes it so that it automatically redirects you to a harmful site
23
Q

How can pharming occur? [2]

A
  • infecting your computer with malware
  • by compromising a DNS server
24
Q

What is social engineering? [2]

A
  • psychological manipulation
  • tricks you into revealing information or taking actions you wouldn’t usually take
25
What do social engineers use? [3]
- impersonation - urgency and fear - scarcity and opportunity
26
What are access levels? [3]
- different levels of access in a computer system - which gives a hierarchy of access levels - which depends on the user's level of security
27
What are the two types of anti-malware? [2]
- anti-virus - anti-spyware
27
What is anti-malware? [1]
- can detect and remove malware
28
What is anti-virus? [2]
- constantly checks for virus attacks - checks computer before it runs/loads
29
What is anti-spyware? [2]
- software that detects and removes spyware programs - which are illegally installed on a computer system
30
What is authentication? [2]
- the ability of a user to prove who they are
31
What are the 3 common factors of authentication? [3]
- something you know (PIN code) - something you have (mobile phone) - something which is unique to you (biometrics)
32
What are biometrics? [2]
- type of authentication - uses unique human characteristics
33
What are examples of biometrics? [4]
- fingerprint scans - retina scans - face recognition - voice recognition
34
What is two-step verification? [2]
- extra layer of security - by requiring a second form of verification
35
What are automatic software updates? [2]
- softwares on computers and mobile phones are kept up to date - done overnight sometimes
36
What are firewalls? [3]
- software or hardware - sits between computer and external network - monitors and filters all incoming and outgoing traffic
37
What are privacy settings? [1]
- allows users to control who see theirs information
38
What are proxy servers? [2]
- adds a layer of security and privacy - companies use them to control and ease the flow of internet traffic
39
What is SSL? [2]
- encrypts data between user and server - having an SSL certificate authenticates that the data exchange is secure
40
What does SSL stand for? [3]
Secure Socket Layer
41
If it has HTTPS in its web address, what does it mean? [1]
The site has an SSL certificate and is therefore secured