Cyber Security Flashcards

1
Q

What is cyber security?

A

It can be defined as the set of measures taken to protect a computer from harm to its data and software. It also includes the protection of computer networks from unauthorised access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is a cyber attack?

A

It is an attempt to gain unauthorised access to, or control of, a computer and the network to which it is connected to

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Reasons for network security:

A
Prevention of data theft
Legal obligations
To keep confidential data
Prevention of data changes
Prevention of data loss
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is a penetration test?

A

An authorised, simulated attack on a computer system, network or website. The aim of the test is to identify any potential vulnerabilities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is white box testing?

A

The tester is provided with all the technical details for the system before they begin the test. The point of this is to simulate an attack by an insider (or ex employee) who might have access to the data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is black box testing?

A

The tester is not given any technical details about the system. The tester uses the same skills and techniques that a real hacker would employ. This enables flaws and weaknesses in the system to be identified, and then hopefully, fixed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is social engineering?

A

Manipulating or tricking people to divulge confidential information about a computer system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is a hacker?

A

A person who uses computers to gain unauthorised access to networks and data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is phishing?

A

This is where cyber criminals pose as trustworthy organisations in an attempt to trick people into giving away sensitive information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is blagging?

A

This is using false pretenses to obtain personal information which can be later used for identity theft

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is shouldering?

A

This is where someone stands nearby so that they can look over a person’s shoulder whilst they are entering data into a device.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is malware?

A

Malicious software, intended to attack a user’s computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is a virus?

A

A piece of code that copies itself whenever it is run, often deleting or corrupting data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is a Trojan?

A

An apparently harmless application that performs harmful operations in the background while running

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is a worm?

A

A piece of code that massively copies itself, using up system resources

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is spyware?

A

Malware designed to spy on the user. Records keystrokes and takes screenshots

17
Q

What is adware?

A

Malware that forces a browser to display unwanted advertisements

18
Q

What is pharming?

A

Malware that redirects browsers to fake versions of websites designed to steal information

19
Q

What is ransomware?

A

Malware that encrypts critical files and data and demands a payment to unlock them

20
Q

What is an antivirus?

A

Software designed to protect a computer against malicious code by detecting and removing malware

21
Q

Examples of main threats to cyber security:

A
Weak passwords
Unpatched software
Malware attacks
Social engineering attacks
Use of removable media e.g. USB sticks
22
Q

What is authentication?

A

The process of verifying the identify of a user

23
Q

What is biometric authentication?

A

Biometric authentication uses the unique physical characteristics of a person to verify their identity.

24
Q

Examples of biometric authentication:

A

Fingerprints
Retinal scans
Voice recognition
Face scans

25
Q

Advantages of biometric authentication:

A

Convenient as the user will always have their body with them

Easy to use - no need to remember passwords

Secure - quite hard to fake biometric data

26
Q

Disadvantages of biometric authentication:

A

Privacy concerns - some people are sceptical of having their biometric data stored on a database

Biometric data may change due to age, surgery or an accident

The hardware for biometric authentication is expensive to purchase

27
Q

What is a password?

A

A set of alpha numeric characters that are used to verify the identity of a user when they attempt to gain access to a network, a device, a software application or web service

28
Q

Characteristics of a strong password:

A

Mixture of lowercase and uppercase letters

Mixture of letters and numbers

Special characters e.g. @, %, £

Should not contain any personal information

8 or more characters long

29
Q

What is CAPTCHA?

A

A CAPTCHA is a very short test designed to identify the difference between humans and bots

30
Q

Disadvantages of CAPTCHA:

A

Difficult for anyone with a visual impairment

There can be a letter in the image which is difficult to decipher

Until you correctly complete the CAPTCHA, you cannot proceed

31
Q

What is two factor authentication?

A

An additional security check which takes place after the username and password have been entered.

It may take the form of an email with a link to be clicked or a code sent as an SMS message

32
Q

What is a software patch?

A

A patch is an update which corrects problems or vulnerabilities in applications.