Chap 5.3 - solutions to cyber security threats Flashcards

1
Q

Access control and levels

A

-hierarchy of different access levels through password to prevent unauthorised access
-important in organisation- keep data relevant to worker
-social networks in privacy settings- public access, friends, customs, data owner

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
1
Q

anti malware function

A

detect and remove malware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

anti virus function

A

-full system checks once a week and updates
-compare virus against signature files ( database of known viruses)
-do heuristics checking - check behaviors for possible viruses
-possible infected file are quarantined- automatically deleted, or asks user’s permission - maybe a false positive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

anti spyware function

A

-detect, remove and prevent installation of illegal spyware softwares
-encrypts file and keyboard strokes
-scans and warns uses of stolen information
-identifies spyware through file structure or typical features related to spyware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

authentication and how it works

A

-process of confirming user’s identity before allowing access
-user need to have something have, know, unique to them

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

ways passwords are kept safe for authentification

A

-change frequently
-run anti- spyware
-shown as * on screen for privacy
-finite amount of tries
-has to match with user name

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

biometrics and how it is done

A

-using physical charastics for access
-fingerprint scans
-retina scans
-face recognition
-voice recognition

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

how does fingerprint scans work, good and bad

A

-image is compared to image stored in database
-1 in 5000 accuracy
good - person always has them, difficult to replicate, unique to each person, easy to use, small storage requirement
bad - mistakes if skin is dirty, damaged fingerprints

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

how does retina scans work, good and bad

A

-use infrared light to scan blood vessels in the eyes
-person has to be still for 10 - 15 s
-1 in 10 000 000 accuracy
good - high accuracy, cannot replicate blood vessels
bad - intrusive, expensive installation, long time to verify

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

how does face recognition scans work, good and bad

A

good- non- intrusive, inexpensive
bad - affected by lighting, hair , age changes, glasses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

how does voice recognition scans work, good and bad

A
  • good - non- intrusive, short to verify, inexpensive
  • bad - voice can be recorded and used, low accuracy, illnesses affecting voice
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

2 step verification

A

-authentication that requires 2 methods of verification to prove user’s identity
-user has to enter username and password
-8 digit pin is sent to user via email/ phone no. which they can enter to get access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

automatic software updates

A

-softwares on device are updated
-done overnight or when device is of
-may contain patches

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

what do patches do

A

update software security/ improve performance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

bad of automatic software updates

A

-disrupts device after n=installation, losing existing data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

what to do when checking spelling and tone

A

check;
-spelling and grammar
-tone and language
-URL links
-for secure protocol

16
Q

Firewalls

A

-software or hardware and protects system by filtering traffic
-between user’s computer and internet
-blocks internet if user’s criteria is not met
-prevents hacking, malware, phishing, pharming
-can’t prevent user’s in internal network to bypass firewall or diasble firewall

17
Q

proxy servers

A

-provides a layer of security between user and internet
-filters and blocks traffic
-keeps user’s IP private
prevents direct access to server
-is hit first when an attack is launched on computer
-faster access to website data using proxy server cache
-act as firewalls

18
Q

privacy settings

A

-controls on website or network that limits data access to public
-stops websites from collecting and using browsing data
-check to see payments method have been saved
-gives alert when browser is in a dangerous website
-web browsers have privacy options

19
Q

Secure Socket Layer (SSL)

A

-security protocol that encrypts data between user and server
-SSL certificates used to authenticate websites
-SSL is applied when there is green pad lock symbol
eg. online banking, online shopping, receiving emails

20
Q

3 differences between proxy server and firewall

A
  1. proxy hides user’s Ip, not firewall
    2.Proxy protects server, firewall protects user’s computer
    3.proxy allows faster access to web page, not firewall
21
Q

2 similarities between proxy server and firewall

A

-both can be either hardware or software
-both block unauthorised access

22
Q

how does SSL ensure data is safe

A

-transmitted data is encrypted to prevent unauthorized access & data integrity
-establishes a secure & encrypted link between the server & the client
-ensures the server is authentic & the intended one

23
Q

difference btw phishing & pharming

A

-phishing tricks people to provide info through fake emails/ websites but pharming redirect users to fake websites without their knowledge
-phishing needs user to interact but pharming exploit vulnerabilities to redirect users