6. Cyber Security Flashcards

1
Q

What is cybersecurity?

A

The protection of a computer/network from a cyber attack.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is pharming?

A

Pharming is a cyber attack intended to redirect a website’s traffic to a fake website.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is social engineering?

A

the art of manipulating people so they give up confidential information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are the 3 main methods of social engineering?

A
  • blagging
  • phishing
  • shouldering
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is blagging?

A

Blagging is the act of creating and using an invented scenario to make a targeted victim directly give away information such as passwords.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

what is Phishing?

A

Sending emails pretending to be a reputable company to try and gain people’s personal details

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is fraud?

A

The crime in which you purposefully deceive someone for monetary gain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is shouldering?

A

Spying on people to find out usernames, passwords or pin codes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is malware?

A

Software that is designed to disrupt or harm a user’s computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are the three main types of malware?

A
  • virus
  • trojan horse
  • spyware
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is a virus?

A

This is a computer program that infiltrates a computer system and replicates itself. It is intended to cause damage to a computer system by corrupting data or by using up all the available memory, causing it to crash.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is a Trojan horse?

A

This is a type of malware that is disguised as a harmless file or download. When the file is downloaded, the malware is downloaded with it. Once the malware is downloaded, it can carry out the attack it was designed to perform.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is spyware?

A

These are computer programs that to gather data about people without their knowledge.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Why does having a weak password make you susceptible to a cyber attack?

A

Because a weak password is easier to guess and therefore it would be easier for an attacker to gain access to your system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Why does having misconfigured access rights make you susceptible to a cyber attack?

A

For example, if a new employee for a company gets full access rights, they may decide to sell them for a profit, which would be terrible for the company as now sensitive, private information is being made public.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Why does having removable media make you susceptible to a cyber attack?

A

Removable media is very easily lost, which could result in the compromise of large volumes of sensitive information stored on it. Some media types will retain information even after user deletion, placing information at risk if in the wrong hands.

17
Q

Why does having unpatched or outdated software proved to be a cyber security threat?

A

Data Breaches: Unpatched security vulnerabilities give attackers an entry point to gain unauthorized access to the company’s sensitive data.
System Downtime: Outdated software and systems are more prone to performance issues, crashes, and instabilities, resulting in the system not working properly

18
Q

What is penetration testing?

A

simulating a cyberattack (trying to get unauthorised access to a system) in order to find weaknesses/vulnerabilities

19
Q

What is the purpose of penetration testing?

A

To evaluate the security of the system.

20
Q

What are the two types of penetration testing?

A
  • white-box testing
  • black-box testing
21
Q

What is white-box testing and what does it simulate?

A

when the person or team testing the system has knowledge of and possibly basic credentials for the target system, simulating an attack from inside the system (a malicious insider)

22
Q

What is black-box testing and what does it simulate?

A

when the person or team testing the system has no knowledge of any credentials for the target system, simulating an attack from outside the system (an external attack).

23
Q

what is biometric security

A

Authentication method which verify users by their physical characteristics like their fingerprints

24
Q

What are password systems?

A

Using another authentication system in addition to users having passwords to add an extra layer of confidence that the correct person is trying to access the system.

25
Q

What is a CAPTCHA?

A

Showing text to a user which cannot be recognised by computers, as the phrase has been distorted past the point of computer recognition, and then asking the user to input the phrase into a text box

26
Q

What is the purpose of CAPTCHA?

A

to differentiate bots from authentic users to stop spammers from hijacking forums and comment sections of various sites

27
Q

What are automatic software updates?

A

the process in which your software applies critical updates without seeking confirmation from a user

28
Q

What does ‘CAPTCHA’ stand for?

A

Completely Automated Public Turing test to tell Computers and Humans Apart

29
Q

give 3 examples of when it would be suitable to use a CAPTCHA system. (3)

A

any 3 from
- making an account on a website
- accessing an account in a website
- online voting
-ticket purchasing
- pages where comments/reviews can be posted