Chapter 7: Cyber Security Flashcards

1
Q

Causes of data corruption and loss

A
  1. Human error
  2. Power failure
  3. Hardware failure or damage
  4. Malicious software or viruses
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Human error

A

Storage devices may be accidentally damaged during transport

Make regular backups of data
Use adequate protection when transporting storage devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Power failure

A

If the power supply to a computer fails, data in the process of being written to a storage device may be corrupted and data that is stored in volatile memory but not yet written to a storage device will be lost

Make regular backups of data
Set up a uninterruptible power supply (UPS) so storage devices can complete any write operations in case of a power failure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Hardware failure or damage

A

All magnetic, optical and solid-state storage device can fail, either due to overuse, manufacturing deflects or age

Make regular backups of data
Check storage devices regularly and replace them immediately when signs of failure are detected

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Malicious software or viruses

A

Some malicious software may purposely damage and corrupt data as a way of attacking the computer

Make regular backups of data
Install anti-virus and anti-spyware software, as well as perform regular scans and updates

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

When does unauthorised access occurs?

A
  1. Poor authentication
  2. Poor access control or authorisation
  3. Poor understanding of privacy policies
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is authentication?

A

The process of verifying the identity of a user

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Authentication Factors

A
  1. Own
  2. Know
  3. Unique
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Ways to prevent authentication

A

PASSWORDS
Keep passwords secret and safe
BIOMETRICS
Choose an appropriate biometric measurement that is difficult to replicate
SECURITY TOKEN
Keep security token in a secure location at all times

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Ways to prevent access control or authorisation

A

FILE PERMISSIONS
Use file permissions in combination with encryption
FIREWALL
Configure the firewall to block traffic from certain well-known harmful programs
ENCRYPTION
Keep secrete keys private and safe

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Ways to prevent understanding of privacy policies

A

SOCIAL NETWORKING SITES

Read and fully understand the privacy policy of the social networking site

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Cookies

A

A small file used by websites to store personal information on a users web browser

Although not malicious in nature, cookies are sometimes misused to collect personal information about users

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Pharming

A

The interception of requests sent from a computer to a legitimate website and redirected to a fake website to steal personal data or credit card details

The stolen data can then be used for unauthorised access to even more of the victim’s data

More difficult to detect then phishing as the fake website users the same address as the real website

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Phishing

A

The use of emails and fake websites that appear to be from reputable companies to steal personal information such as passwords and credit car numbers from users

The stolen data can then be used for unauthorised access to even more of the victims data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Spamming

A

The mass distribution of unwanted messages or advertising to email addresses which are collected from sources such as public mailing lists, social networking sites, company websites and personal blogs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Spyware

A

A hidden program that secretly collects personal information about its users and transmits this information to attackers without the users’ knowledge

The collected data can then be used for unauthorised access to even more of the victims data

17
Q

Trojan horse

A

A computer program that pretends to be a harmless file or useful application

Once a trojan horse is run, it does something harmful such as giving intruders unauthorised access to the computer instead

18
Q

Unauthorised access

A

The use of data owned by someone by someone else, such as an instruder, without permission.

Can lead to identity theft, stolen money and public embarassment

19
Q

Virus

A

A computer program that attaches itself to a normally harmless program and modifies it

When the modified program is run by a user, the virus attaches copies of itself to any other programs it can find, thus “infecting” them

20
Q

Worm

A

A computer program that runs automatically and attempts to spread by sending copies of itself to other computers

Unlike a virus, a worm does not need to attach itself to an existing program

21
Q

Firewall

A

A device or computer program that prevents unauthorised access to or from a private network

22
Q

Encryption

A

Process of encoding a message so that a secret key is needed to decode the data

23
Q

How to prevent privacy and security threats

A
  1. Install Anti-virus and Anti-spyware programs
  2. Update software regularly
  3. Identify pharming
  4. Identify phishing
  5. Manage cookies
  6. Manage spam
24
Q

Anti-virus and Anti-spyware

A

ANTI-VIRUS
Software to detect, remove and stop viruses and other malware from running
ANTI-SPYWARE
Software to detect, remove and stop spyware and other malware from running
BOTH
Used to:
1. Detect when malware is about to run and stop it
2. Detect malware that is already running and try to stop it
3. Scan the user’s storage and email to detect and remove malware

25
Q

Identify pharming

A
  1. Regularly check bank, debit or credit card and other statements to ensure all transactions are legitimate
  2. Regularly update web browsers and the software running on network hardware so that all knowned bugs are fixed
26
Q

Identify phishing

A
  1. The email uses a generic greeting such as “Dear Customer” or “Dear User” . This is a sign that the email was sent automatically and not by a person
  2. The email has inaccurate logos, gramatical and spelling errors that suggest it is not from a legitimate source
27
Q

Manage spam

A

Look out for options to off email updates and participation in mailing lists when signing up for or changing the settings of an online account. Many sites leave such options on by default and additional effort is needed to off them

28
Q

Copyright

A

The legal right of owners to control the use and distribution of their intellectual property

29
Q

Intellectual property

A

Creations of the mind that have value but can exist purely as data with no physical form

30
Q

Types of software licences

A
  1. Public domain software
  2. Free and open-source software (FOSS)
  3. Proprietary software
  4. Freeware and shareware
31
Q

Public domain software

A

Software where the legal protections that are typically granted to intellectual property have either expired, been surrended of simply inapplicable

32
Q

Free and open-source software (FOSS)

A

Software where users are given freedom to change, copy, study and share the software and its source code

33
Q

Proprietary software

A

Commercial software for which most of the legal protections under copyright are retained

34
Q

Freeware and shareware

A

FREEWARE
Proprietary software that is available for use at no cost
SHAREWARE
Demonstration software that is distributed for free but for a specific evaluation period only

35
Q

Copyright infringement

A

Use or distribution of copyrighted work without the permission if the copyright owner

36
Q

Software piracy

A

Crime of copying, distributing and/or using proprietary software in a manner that is not permitted by its licence

37
Q

How to avoid commiting software piracy

A
  1. Check and follow the website’s terms and conditions
  2. Limit reproduction of a copyrighted work to 10%
  3. Consider using public domain material instead
38
Q

Plagiarism

A

Passing off someone else’s original work as one’s own