Chapter 5.3 - cyber security threats Flashcards

You may prefer our related Brainscape-certified flashcards:
1
Q

What is:

Cyber security

A

Processes, policies, and practices designed to protect agianst any threats or unauthorised access to networks, computers, programs or data.
A combinasion of strategies are designed to give a robust defense

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the different:

Categories of attack

A
  • Hacking
  • Brute force attacks
  • Data interception and theft
  • Malware: Spyware and pharming
  • Social engineering: phising, shouldering, suspicious links
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are the different:

Forms of defences

cyber security,

A
  1. Firewall
  2. encryption
  3. physical locks
  4. passwords
  5. network policy
  6. user awarness of phising ‘clues’
  7. concealing your password or PIN entry
  8. Strong passwords with limited attempts allowed
  9. anti-malware/ anti-spyware software
  10. Checking the URL, making sure the site says HTTPS, not HTTP, as well as using a trusted internet service provider
  11. Hovering over a suspicious link revealing the destination before clicking it
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is:

Malware

A

a malicious software written to cause inconvenience or damage to programs or data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Different forms of:

Malware

A
  • Viruses and worms
  • trojan horse
  • ransomware and adware
  • distributed denial of service (DDOS) attack
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are:

Viruses and worms

A
  • A virus is a program installed on a computer without the user’s knowledge/permission with the purpose of doing harm and relies on a host file to spread itself to other computers
  • A worm is similar except it replicates itself and uses’ up the computer’s resources
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is a:

Trojan horse

A
  • Pretends to be a normal file with a legitimate purpose wich has another, and when the link is clicked it can give unauthorised access to a computer for example
  • Cannot replicate itself, but has a lot of flexibility on its purpose.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is:

Ransomware

A
  • Malware that encrypts a victims file.
  • A ransom is demanded so that the user can decrypt the files, which is usually paid in digital currencies such as bitcoin
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is:

Adware

A
  • Malware that displays onscreen advertisments.
  • May not be dangerous but can redirect the browser to an unsafe site or contain spyware
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is:

Spyware

A

Allows a user to gather activity, passwords and payment information from another user’s computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is:

Distributed Denial of service attack

A
  • an attack which targets a server with a lot of requests.
  • multiple interconnected devices makes a botnet
  • This leads to the server crashing as there are too many requests
  • real requests cannot be determined and seperated from the false so there is a denial or service
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are the different methods to:

Keep data safe

7

A
  • Biometrics
  • two step verification
  • passwords
  • automatic software updates
  • Secure Socket layer (SSL) protocol
  • Privacy settings
  • Proxy servers
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are:

Biometrics

A
  • pre-recorded human characteristics
  • Methods are:
  • Facial recognition
  • Iris and retina scanners
  • fingerprint or palm recognition
  • voice recognition
    This is compared to the ones of the person trying to enter the phone. The user is let in if it is the same
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is:

Two-step verification

A
  • Two authentication methods
  • e.g. a 4digit code sent in a text message to the phone as part of the login method
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

How to effectively use:

Passwords

A
  • Change them regularly
  • use different ones on each website
  • use a mixture of characters numbers and symbols
  • Have a long password
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are:

Automatic software update

A
  • Updates keeping software and the operating system up-to-date
  • bugs and security flaws can be fixed when they are known about with a patch
16
Q

What is:

SSL

A
  • Secure socket layer protocol
  • Provides a secure channel between two computers
  • Used between a web browser and server
  • Used when the address contains https, with s being for secure
17
Q

What is:

Privacy settings

A
  • Settings which allows to control the access to posts and controls privacy in the websites and apps browsed.
18
Q

What is a:

Proxy server

A

A machine that checks and forwards traffic between networks or protocols. This is an intermediary server that can give functionality, security or privacy based on needs or company policy