Computer Science - Cyber Security Threats Flashcards

1
Q

What does the social engineering technique do?

A

People are tricked or manipulated into giving away confidential information or access details. Techniques include blagging,phishing and shouldering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What does malicious code do?

A

Malicious programs are installed on a computer system. They cause damage and disrupt functionality or steal info. Types of malware include computer viruses, Trojans and spyware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What does pharming do?

A

Users of a website are redirected to a Fake version of the website. Login details are captured to enable the criminal to access the real account

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What do weak and default passwords do?

A

Weak or default passwords are used to gain access to a network or computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What does misconfigured access rights do?

A

Users are able to access emails and files belonging to another user.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What does removable media do?

A

Can be used to copy and steal data from a system. Can also introduce malware to a system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What does unpatched and/or outdated software do?

A

Can make a system vulnerable to hacking or being attacked by malware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is penetration testing ?

A

Penetration testing tests a system or network in order to identify vulnerabilities in to security that an attacker could exploit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are the 2 types of penetration testing.

A

Black and white box penetration testing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Explain what the 2 types of penetration testing are.

A

White box penetration is designed to stimulate a malicious insider who has knowledge of the target system and is likely to have basic credentials to gain access.

Black box penetration test is designed to stimulate an external hacking or cyber warfare attack, where the attacker has no knowledge of any usernames,passwords or other normal means of access for the target system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are the 3 different types of social engineering?

A

Blagging,phishing and shouldering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is blagging?

A

The criminal invents a scenario to engage a targeted victim. Victims are persuaded to divulge info or perform actions that would be unlikely in ordinary circumstances

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is phishing?

A

Fake emails, SMS messages or websites are used to trick people into giving away their persona data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is shouldering?

A

Observing over the shoulder of a person as they enter details such as their password or PIN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is malware?

A

Malware is a software that’s been written with the intention to cause damage and disrupt the functionality of a computer system or to steal data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is anti-malware software?

A

Designed to detect and remove malware.

17
Q

What are the 3 types of malware?

A

Virus, Trojan and spyware

18
Q

What does a virus do?

A

It’s hidden inside or attached to another file or programme. It’s only run when the host program is executed. It deletes and corrupts data and files

19
Q

What does the malware Trojan do?

A

Looks like a legitimate software. It slows the computer and creates back door access for hackers

20
Q

What does spyware do?

A

Often bundled with free software. Logs activity and keystrokes and sends these back to a criminal