Computer Security Basicis Flashcards

1
Q

Define Authorised Users

A

The people who are meant to have access to a system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Define Hackers

A

People who attempt to gain access to a computer system in a way not intended by the system’s owner

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Define Malware

A

Malicious software created or used by hackers that do something the owner of a system doesn’t want to happen

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Define Severity

A

The seriousness of a crime, either from the perspective of the victim or from the perspective of judges and sentencing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Define Secure System

A

Secure against known threats and reasonable, theoretical ones

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Define White hat hackers

A

Security professionals are brought in and paid explicitly to test the security of a system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Define Black hat hackers

A

People who will gain access to a system without permission and steal or alter data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Define Grey hat hackers

A

People who gain access to a system without permission but do not do anything malicious with the data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Define Physical Security of End-Points

A

An essential assumption in all of this is that malicious people don’t have physical access to your computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are some times of basic malicious software or malware

A

Computer Virus, Trojan Horses, Worms, Zombies,

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Define a Computer Virus

A

Unwanted, self-replicating embedded code with a debilitating effect, different to a “bug” as it’s deliberate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Define a Trojan Horse

A

Software that masquerades as something else that does something malicious when executed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Define a Worm

A

A network propagated virus, meaning it spreads from computer to computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Define Zombies

A

A software program that is used to control your computer remotely without your knowledge or a computer-controlled in such a way

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are some technically advanced malware

A

Key Loggers, RootKits, BIOS RootKits

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Define Key Loggers

A

Software that sits on a computer and logs the keys you press

17
Q

How are Key Loggers installed

A

Installed with a Trojan Horse, hidden with RootKits

18
Q

Define RootKits

A

Hides software’s presence from users by gaining access to a system

19
Q

Define BIOS RootKit

A

The evolution of the root kit