C3 - B - Cyber Security Flashcards

1
Q

What is Cyber Security?

A

Cyber security is how individuals and organisations reduce the risk of cyber attack.

Cyber security’s core function is to protect the devices we all use (smartphones, laptops, tablets and computers), and the services we access - both online and at work - from theft or damage.

It’s also about preventing unauthorised access to the vast amounts of personal information we store on these devices, and online.

https://www.ncsc.gov.uk/section/about-ncsc/what-is-cyber-security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is Malware?

A

Malware is intrusive software that is designed to damage and destroy computers and computer systems. Malware is a contraction for “malicious software.”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are examples of Malware?

A
  • Viruses
  • Worms
  • Trojan Horses
  • Ransomware
  • Spyware
  • Adware
  • Rootkit
  • Botnet
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are some real-world examples of malware?

A
  • Emotet Trojan
  • Wannacry Ransomware
  • Stuxnet Worm
  • MyDoom Worm
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is a Virus?

A

A malicious software that attaches itself to a document or file that can execute its code and spread its files.

They will remain dormant when installed, until the host file is open and used.

They are designed to harm the computer’s ability to operate by deleting, corrupting or modifying files.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is a Worm?

A

Worms are malicious software that rapidly replicates and spreads to any device within a network. A worm may not cause any damage, but they can cause throttling on the network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is a trojan horse?

A

Named after the Trojans that brought a fake horse to the Greek city of Troy, where they were hiding inside.

This is pretty similar to how the software works, it takes the place of a program, game or cracked file, and inside it will be negative program code which causes damage to the computer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is Spyware?

A

This is malicious software that runs discreetly on a computer, reporting a users action to a remote user. For example, passwords entered. They are typically delivered by trojan horses.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is Adware?

A

Adware is malicious software that is used to collect data on your computer usage. While not always dangerous, it can cause issues for your system, for example redirecting a user to unsafe sites. It can also significantly slow down your computer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is Ransomware?

A

Ransomware is malicious software that gains access to sensitive information within a system, encrypts that information so that the user cannot access it, and then demands a financial payout for the data to be released.

Ransomware is commonly part of a phishing scam. By clicking a disguised link, the user downloads the ransomware. The users data is then encrypted with a key the hacker only has access to, and then payment is requested. A user may not get their data back if they have made the payment.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is Rootkit?

A

A rootkit is a set of programs that aims to gain root or administrator access to a computer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is a Botnet?

A

Botnet comes from robot network.
In a botnet, a hacker will first infect machines to make zombie devices.
These computers can then be controlled by one central computer.
This gives a hacker free and anonymous access to computers.
Common uses for botnets are: Denial of service attacks, Sending spam.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is Social Engineering?

A

The use of deception to manipulate individuals into divulging confidential or personal information that may be used for fraudulent purposes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are some of the methods of social engineering?

A
  • Shoulder Surfing
  • Tailgating
  • Phishing
  • Scareware
  • Pretexting
  • Quid Pro Quo
  • Pharming
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is shoulder surfing?

A

Shoulder surfing is where an attacker looks over a person without their knowledge, in order to collect data from the user as they operate their device.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is Tailgating

A

Tailgating is when a social engineer physically trails or follows an authorized individual into an area they do not have access to. This can be as simple of an act as holding a door open for someone else. Once inside, they have full reign to access devices containing important information.

17
Q

What is Phishing?

A

Phishing is a well known social engineering method and it covers many sub categories. In essence its gaining information through methods such as emails, texts or phone calls - where the attacker would typically impersonate a company or bank.

18
Q

What is Scareware?

A

Scareware is a type of malware that makes the user take action fast for something that isn’t of an issue. For example a pop up saying to install a antivirus as your computer is infected. In this case a user would want to take action fast and would click on the download button not realising they are installing a virus.

19
Q

What is Pretexting?

A

Pretexting is a method used to gain the users attention and then when they are vulnerable the social engineer tries to trick the user into providing something of value.

20
Q

What is Quid Pro Quo?

A

This means a favour for a favour, in essence, “I give you this, and you give me that.” In this instance the victim will provide the attacker with sensitive information, but the attacker doesn’t hold up their end of the deal.

21
Q

What is Pharming?

A

Pharming is where an attacker sets up a redirect to send legitimate website visitors to a fake website. The idea being that the user will enter their sensitive data on the website.

22
Q

What are System Attacks?

A

A cyberattack is any offensive maneuver that targets computer information systems, computer networks, infrastructures, or personal computer devices.

23
Q

What is a D(DoS) attack?

A

A DDoS attack or a distributed denial-of-service attack is a malicious attempt to disrupt the normal traffic of a targeted server, service or network by overwhelming the target or its surrounding infrastructure with a flood of Internet traffic.

A DoS attack is the same idea, but instead of multiple attackers, there is only one.

24
Q

What is a Man in the Middle attack?

A

A MITM attack is where an attacker intercepts communications between the user and the server to harvest any data of interest.