6 - Cyber security Flashcards
What is cyber security?
the protection of networks, computers, or data from attack, damage or unauthorised access with certain testing routines and technologies
Name 7 cyber security threats:
-social engineering techniques
-malware
-pharming
-weak/default passwords
-outdated/unpatched software
-removable media
-misconfigured access rights
(SMP, WORM)
What is social engineering?
the art of manipulating people (a system’s greatest vulnerability) to make them give up confidential information
What are some common techniques used in social engineering? Describe them:
blagging - lying about something to gain info, that the victim wouldn’t usually do under ordinary circumstances.
phishing - fraudulently obtaining confidential info using emails/SMS
shouldering - observing a person’s private info without consent at places like ATMs
Blagging is also known as pretexting, and shouldering is known as shoulder surfing
How could phishing be prevented?
-educate users to not click on fraudulent emails that ask you for personal info or to click on links
-prevent users from downloading files on emails
-use a firewall and keep it updated so it can’t be exploited
What is malware?
malicious software referring to a variety of forms of hostile or intrusive software
Describe 3 types of malware:
virus - hidden program within another program that can self-replicate into other programs, spread by removable media
trojan - malicious software disguised to be legitimate or run another program
spyware - gathers info about a user without them knowing (eg keyloggers)
What is pharming?
a cyber attack intended to redirect a website’s traffic to a disguised fake website hosted on a malicious server, where details may be stolen
Why are weak/default passwords a cyber security threat?
-can easily guess passwords by brute force, and default passwords are usually posted online
-system is vulnerable to unauthorised access
-can allow the attacker to gain access to admin accounts
Default passwords are the ones where a website makes it for you, but then prompts you to change it
Why is having misconfigured access rights a cyber security threat?
-access rights block users from doing certain things, eg downloading software or accessing confidential info
-access rights must be assigned correctly, so confidential info is only accessible to those who need it to prevent insider attacks of reconfiguring the network or giving themselves admin
An insider attack is where someone attempts to gain unauthorised access when they have only some access rights
Why is removable media a cyber security threat?
-data theft, intentional and unintentional (where unencrypted data is stored on it and falls into the wrong hands)
-could introduce malware into the network/computer system
Why is using unpatched/outdated software a cyber security threat? How can it be protected against?
-older software is more likely to be hacked, as it usually contains known weaknesses that can be exploited and used to introduce malware
-use automatic software updates to install updates/patches as soon as they are available
What is penetration testing?
the process of identifying vulnerabilities in a system’s security, by attempting to gain access to resources on it without knowledge of credentials and other means of access
What is the purpose of a white box penetration test?
simulates a malicious insider who has basic credentials and knowledge of the target system
What is the purpose of a black box penetration test?
simulates an external hacking/cyber warfare attack where the attacker has no knowledge of the target system or credentials