9.1 Cyber Security Flashcards

1
Q

What is malware?

A

Malware is malicious software designed to cause damage to computer systems, e.g. virus, worm, Trojan and Ransomware.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is social engineering?

A

Social engineering is where the hackers trick the user into giving their private information out, because they trust the hacker is the real person they are pretending to be.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the difference between a brute force attack and a denial of service attack?

A

A brute force attack is when a hacker keeps trying all possible options of password to hack into an account, e.g. trial and error, whereas a distributed denial of service attack is where botnets/zombie computers are used by hackers to crash websites, by flooding the website with irrelevant requests.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are the reasons for attacking computer systems?

A

Fun, challenge, revenge, disruption, industrial espionage, money.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is industrial espionage?

A

Industrial espionage is when a hacker is used to spy on other business competitors to steal business/industrial secrets.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

How does an attack cause disruption?

A

If a business is attacked, the computer system needs to shut off, and thus the computers cannot be used - this is known as downtime, e.g. when the school email was hacked, we had no access to the school website until the issue was fixed, which caused an issue in the computing lesson where we use Google Classroom.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is a security breach?

A

When a system has been breached/broken into, e.g. the hacker has got through the defences.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the impact of the security breach on the business?

A

Downtime, loss of sales, loss of income, loss of data, loss of reputation, fines.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is the impact of the security breach on the customers?

A

Loss of reputation (social media word-of-mouth), loss of custom, anger, worry.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

How can user access be restricted?

A

Username and password, biometrics, 2 factor authentication, physical locks on doors.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is biometrics?

A

The unique identity of the individual is used to identify them, e.g. fingerprints, iris scanner, facial recognition.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is 2 factor authentication?

A

When two forms of identification are used to identify/verify the user, e.g. password and PIN, code sent to phone etc.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is a firewall?

A

A firewall monitors data traffic going in and out of the organisation, letting unsuspicious code through whereas suspicious code is stopped, blocked and reported to the user.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is anti-virus software?

A

Anti-virus software recognises the signature code of computer viruses, e.g. the program code, and stops, quarantines and deletes it so that it can do no further harm to the computer system. Anti-virus software needs to be updated regularly.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is encryption?

A

Encryption is where code is jumbled during data transfer so if it is intercepted during data transfer (man-in-the-middle attack), the data would not make any sense.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly