5.3 - Cyber Security Flashcards

You may prefer our related Brainscape-certified flashcards:
1
Q

Brute - force attack

A

-A brute-force attack is a type of cyber security attack that tries to guess a password or encryption key by trying every possible combination of characters
-This can be done by using a computer program to automatically generate and test different combinations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Data interception

A
  • stealing data as it is being transmitted between two computers
    -This can be done by using a variety of techniques, such as sniffing, packet injection, and man-in-the-middle attacks
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Distributed denial-of-service (DDoS) attack

A
  • overwhelms a website or server with traffic, making it unavailable to legitimate users
    -This can be done by using a botnet, which is a network of compromised computers that can be controlled by a hacker
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Hacking

A
  • involves gaining unauthorized access to a computer system or network
  • This can be done by exploiting vulnerabilities in the system or network, or by using social engineering techniques to trick the system’s administrator into giving the hacker access.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Malware (virus, worm, Trojan horse, spyware, adware, ransomware)

A
  • Malware is a type of software that is designed to harm a computer system
  • There are many different types of malware, including viruses, worms, Trojan horses, spyware, adware, and ransomware.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Phishing

A
  • using deceptive emails, text messages, or even phone calls to lure you into clicking a malicious link or attachment
    -These links often lead to fake websites that look like legitimate ones, such as your bank or social media platform
  • Once you enter your login credentials or other sensitive information on the fake site, the attacker steals it.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Pharming

A
  • manipulating your computer’s settings or the DNS system to automatically redirect you to a malicious site, even when you type in the correct website address
  • This is like the angler secretly changing the direction of your fishing line to a hidden trap.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Social engineering

A

-This broader strategy involves psychological manipulation to trick you into revealing information or taking actions you wouldn’t normally take

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Access levels

A

prevent unauthorized access to sensitive data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Anti-malware

A

Anti-malware programs can detect and remove malware. For example, Norton AntiVirus provides real-time protection and automatic updates to safeguard your computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Authentication

A

Username and Password: The most common form of authentication. For example, logging into your email requires a username and password.
- Biometrics: Use physical characteristics like fingerprints or facial recognition for access. Smartphones often have biometric security.
- Two-Step Verification: Adds an extra layer of security by requiring a second form of verification, like a code sent to your phone, in addition to your password.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Automatic software updates

A

Automatic updates keep systems secure. Microsoft Windows Update can automatically download and install security patches.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Checking the Spelling and Tone of Communications

A

Phishing emails often contain spelling errors. Companies train employees to spot such errors to avoid falling for scams

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Checking the URL Attached to a Link

A

Before clicking on a link, check if the URL looks legitimate and matches the expected destination.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Firewall

A

Firewalls can be software or hardware and protect networks by filtering traffic. For instance, the Windows Firewall protects your computer by blocking unauthorized access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Privacy settings

A

Privacy settings on platforms like Facebook allow users to control who sees their information.

17
Q

Proxy servers

A

Proxy servers add a layer of security and privacy. Companies often use them to control and ease the flow of internet traffic.

18
Q

Secure Socket Layer (SSL) Security Protocol

A

SSL encrypts data between the user and the server. When you see “https” in a web address, that site has an SSL certificate.