Cyber security Flashcards
Cybersecurity
The practice of protecting systems, networks, and programs from digital attacks. These cyberattacks are usually aimed at accessing, changing, or destroying sensitive information; extorting money from users; or interrupting normal business processes.
Network security
Any activity designed to protect the usability and integrity of network and data. It includes both hardware and software technologies. Effective network security manages access to a network. It targets a variety of threats and stops them from entering or spreading on a network.
Hackers
Individuals who will violate computer security for malicious or financial reason
Ethical hackers
Individuals whose activities are designed to test and enhance computer security
Hacktivists
Individuals who use technology to announce a social, ideological, religious, or political message.
Keylogging
Software designed to record and store every keystroke made on a computer. Criminals often attempt to install keylogging software onto a computer remotely.
Social engineering
The psychological manipulation of people into performing actions or divulging confidential information.
Tailgating
Tailgating is a physical security breach in which an unauthorised person follows an authorised individual to enter secured premises.
Pharming
Pharming redirects victims to a bogus site even if the victim has typed the correct web address. This type of scam is often applied to the websites of banks or e-commerce sites.
Phishing
Phishing is the act of trying to obtain confidential records such as passwords. Emails that look as if they are from a legitimate, respected organisation are sent, but they contain links to fake websites that ‘phish’ data from unsuspecting victims.
Eavesdropping
A technique that involves the social engineer being physically present to overhear confidential conversations
Shoulder surfing
Looking over another person’s shoulder to view passwords or other data that is being entered.
Malware
Short for malicious software, this is programming or code that is used to disrupt computers by:
● Gathering sensitive information
● Gaining access to private computer systems
● Displaying unwanted advertising
● Distributing the performance of a computer or network
Trojan
A malicious computer program that tricks users into willingly running it is called a ‘Trojan horse’ or simply a ‘Trojan’. They can be delivered via internet downloads, infected USBs, or email attachments.
Zombie
A computer connected to the internet that has been compromised by a hacker, computer virus, or Trojan horse program and can be used to perform malicious tasks under remote direction.