Cyber security Flashcards

1
Q

Cyber security

A

The practice of protecting systems, networks, and programs from digital attacks. These cyberattacks are usually aimed at accessing, changing, or destroying sensitive information; extorting money from users; or interrupting normal business processes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Network security

A

The practise of protecting the usability and integrity of network and data. It includes both hardware and software technologies. Like firewalls and intrusion prevention systems. Effective network security manages access to a network. It targets a variety of threats and stops them from entering or spreading on a network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Individuals who will violate computer security for malicious or financial reasons; they may also be known as crackers. they may also do it with good intentions, such as ethical hackers and penetration testers.

A

Hackers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Ethical hackers

A

Individuals whose activities are designed to test and enhance computer security; they may also be known as ethical hackers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Hacktivists

A

Individuals who use technology to announce a social, ideological, religious, or political message.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Software designed to record and store every keystroke made on a computer. Criminals often attempt to install keylogging software onto a computer remotely. It can be used to record passwords and messages.

A

Key logging

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Pharming

A

Pharming redirects victims to a bogus site even if the victim has typed the correct web address. This type of scam is often applied to the websites of banks or e-commerce sites.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Phishing

A

Phishing is the act of trying to obtain confidential records such as passwords. Emails that look as if they are from a legitimate, respected organisation are sent, but they contain links to fake websites that ‘phish’ data from unsuspecting victims.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Pretexting

A

Attackers focus on creating a good pretext, or a fabricated scenario, that they can use to try and steal their victims’ personal information. This type of attack commonly takes the form of a scammer who pretends that they need certain bits of information from their target in order to confirm their identity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Baiting

A

Similarly to phishing attacks, the scammer promises items or goods to entice their victims.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Malware

A

Short for malicious software, this is programming or code that is used to disrupt computers by:
● Gathering sensitive information
● Gaining access to private computer systems
● Displaying unwanted advertising
● Distributing the performance of a computer or network
or holding data ransom

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Trojan

A

A malicious computer program that tricks users into willingly running it is called a ‘Trojan horse’ or simply a ‘Trojan’. They can be delivered via internet downloads, infected USBs, or email attachments.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

This type of attack can occur when an attacker systematically submits guessed passwords with the hope of eventually guessing correctly.

A

Brute force attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

DDoS

A

In a distributed denial of service attack (DDoS attack), the incoming traffic flooding the victim originates from many different sources. This makes it impossible to stop the attack simply by blocking a single source.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Virus

A

Malware that usually embeds itself into existing software on a device and then, once that software is run, spreads to other executable files.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Worm

A

While also self-replicating, a worm does not need to infect an existing program. Worms are able to spread very rapidly, infecting large numbers of machines.

17
Q

Ransomware

A

This type of Trojan can modify data on a computer or device so that it doesn’t run correctly or so that users can no longer use specific data. The criminal will only restore the computer’s performance, or unblock data, after the victim has paid them the ransom money they demand.

18
Q

Ransomware

A

This type of Trojan can modify data on a computer or device so that it doesn’t run correctly or so that users can no longer use specific data. The criminal will only restore the computer’s performance, or unblock data, after the victim has paid them the ransom money they demand.

19
Q

Spyware

A

Programs that can spy on how a user makes use of their computer or device, for example by tracking the data entered via a keyboard, taking screenshots, or getting a list of running applications.

20
Q

Software that contains advertisements embedded in the application. It is not always a bad thing and is considered a legitimate alternative offered to consumers who do not wish to pay for software.

A

Adware

21
Q

Encryption

A

Encryption is the process of encoding data or a message so that it cannot be understood by anyone other than its intended recipient.

22
Q

Caesar cipher

A

The cipher works by giving a number value to a key. Each plain text letter is replaced by a new letter: the one found at the original letter’s position in the alphabet, plus or minus the value of the key.

23
Q

An encryption key is a piece of information, usually random characters, used by a software algorithm to encrypt data or a message into a form that is unreadable (encryption) and allow the data or message to be made readable again (decryption).

A

Encryption Kay

24
Q

Firewall

A

A firewall sits between a local network or computer and another network, controlling the incoming and outgoing network traffic.

25
Q

Antivirus software

A

Software that is designed to detect and block attacks from malware. Some operating systems have their own inbuilt antivirus software.

26
Q

Network policy

Archiving policy

A

Usually contains both an archiving policy and an acceptable use policy.
A policy that determines how long data can be kept for.

27
Q

Disaster recovery policy

A

A policy that allows an organisation to resume business quickly during or after a disaster, which could include a cyberattack.

28
Q

MAC address

A

A unique identifier that is used as a network address in communications within a network.

29
Q

MAC address white list

MAC address black list

A

MAC addresses permitted to access a network.

MAC addresses banned from a network.

30
Q

MAC address filtering

A

This limits the devices that can access a network, either including or excluding specific devices by using their unique MAC address.

31
Q

A type of security testing used to test the insecure areas of a system or application.

A

Penetration testing

pen test

32
Q

Network forensics

A

The monitoring and analysis of computer network traffic for information gathering and intrusion detection.

33
Q

Physical security

A

Describes security measures that are designed to deny unauthorised access to facilities, equipment, and resources and to protect personnel and property from damage or harm, e.g. the use of passcards and biometric checks (fingerprints, retinal scans).

34
Q

White box pen test

A

Testing in which the tester has full knowledge, more like a malicious insider.

35
Q

Grey box pen test

A

Testing in which the tester has some knowledge — a compromise between a white and black box pen test.

36
Q

Black box pen test

A

Testing in which the tester has no knowledge, more like an external hacker.