B - Cyber Security Flashcards

1
Q

Hacking

A

Unauthorised access to a computer system. Covered by the Computer Misuse Act 1990

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Why are systems attacked?

A

Fun, financial gain, industrial espionage, personal attacks, hacktivism (hacking for activism)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Types of Hackers

A

Black Hat - a hacker with malicious intent, Grey Hat - a hacker with neither malicious or heroic intent, White Hat - a hacker with heroic intent to stop other hackers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Types of threat to a computer system

A

Unauthorised access, virus, worm, botnet/DDoS attack, rootkit, trojan, ransomware, spyware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Virus

A

A computer program or part of a computer program that can make copies of itself and is intended to prevent the computer from working normally

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Worm

A

a harmful computer program that can copy itself and spread across a number of connected computers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Botnet

A

A group of computers that are controlled by software containing harmful programs, without their users’ knowledge

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

DDoS

A

Distributed Denial of Service: an occasion when a computer network or website is intentionally prevented from working correctly, by a botnet sending lots of data at once.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Rootkit

A

A type of malware designed to give hackers access to and control over a target device. Most rootkits affect the software and the operating system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Trojan

A

A computer program that has been deliberately designed to destroy information, or allow someone to steal it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Ransomware

A

Software designed by criminals to prevent computer users from getting access to their own computer system or files unless they pay money.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Spyware

A

Software that collects information about how someone uses the internet, or personal information such as passwords, without the user knowing about it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Social Engineering

A

Manipulating people so that confidential information can be found out.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Why does social engineering work?

A

Most people want to do the right thing, and this is why it works. In a recent study, 60% of unauthorised USB drives were mounted to a computer and used in a controlled environment.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Types of Social Engineering

A

Phishing, pharming, shoulder surfing, tailgating, baiting, pretexting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Internal Threats

A

dodgy websites, portable storage, stealing/leaking data, disclosure of data, overriding security, downloads

17
Q

Why do Internal Threats happen?

A

accidents or employee choosing to attack a business

18
Q

impacts of an Internal Threat

A

short term (data loss/downtime, lost sales), long term (reputation damage, financial loss)

19
Q

Firewall

A

set of rules that filter suspicous network packet from remote networks

20
Q

Hardware Firewall

A

Sits between an external network and an internal connection - like a LAN and the internet - as a first line of defence.

21
Q

Software Firewall

A

On a system - like a computer - to filter network data in and out. Secondary protection, which uses an ACL to block certain data.

22
Q

Types of Device Hardening

A

security patches, anti-virus, firewalls, user permissions, closing ports, encryption