5.4 User Security Flashcards
Define social engineering (2)
Invovles manipulating of people
occurs when cybercriminal creates a social situation that can lead to a victim dropping their gaurd
What are the 5 types of social engineering (5)
Instant messaging
Scareware
Email/Phishing scams
Baiting
Phone calls
What is instant messaging (1)
Malicious links embedded into instant messages
Features of scareware (2)
pop-up message claiming that user’s computer is infected with a virus
user is told to download anti-virus that looks real (fake)
How is baiting carried out (2)
cybercriminal leaves malware infected memory stick somewhere
curious user plugs memory stick into computer and downloads the malware
What human emotions is social engineering exploiting (3)
fear
curiosity
empathy and trust
Purpose of access levels (2)
different levels of access for different people
have a hierarchy of access levels
What are the 4 access levels (4)
Public access
friends
customs
data owner
Define public access (1)
data that the general public can access
Define friends (1)
(only people identified as “friends” by the owner of the data can see certain data
Define customs (1)
user can exclude certain content from selected people
Define data owner (1)
data only owner can see
2 types of anti-malware (2)
anti-virus
anti-spyware
Define anti-spyware (1)
Detects and removes spyware programs
How does anti-spyware remove spyware using the rules method (2)
software looks for typical features which are usually associated with spyware
identifying any potential security issues
How does anti-spyware remove spyware using the file structure method (1)
looks for certain file structures associated with spyware
Define authentication (1)
Ability of a user to prove who they are
Common factors used in authentication (3)
Something you know (password or PIN code)
Something you have (mobile phone or tablet)
Something unique to you (biometrics)