cyber security Flashcards
cyber security
the process and technologies that protect from attack, damage or unauthorised access
(protects networks, computers programs and data)
companies can be fined for not protecting your data
password policy
- upper case
- lower case
- special characters
- numbers
- over 8 characters
- change it often
misconfigured access rights
rights are assigned to the wrong person so they can access things they shouldnt be able to - security breach
- eg a student can see the grades of all other students - data leak
pharming attack
a cyber attack that redirects a user to a fake website
pharming attack process
- when your device requests a website it asks a DNS server for the IP address
- DNS gives the IP
-your device sends a HTTP address to that IP address - a hacker can change the entry on the DNS and make it point to their fake website - DNS is poisoned
- fake website appears real but collects personal data eg bank login
DNS server
Domain Name System server
removable media
a storage device that can be inserted/removed eg USB/SD card
- can be used to introduce malware/steal data/files
- malware can be present on the comp and infect the media
OR - a hacker can leave an infected USB which someone puts in a comp
unpatched software
- updates fix know security issues
- comps not updated are an easy target for hackers that know about a vulnerability
- software needs to be patched/updates to protect against this weakness
most important to update - OS - has full control over comp
- anti-virus software - detect new malware
social engineering
the ability to obtain confidential info by manipulating people for it - give info willingly
phising
using an email/SMS (with links in) to obtain info
send an email pretending to be from bank etc to try and get info
- not personalised/ wrong sender address/ fake link/ request personal info/ poor spelling/ urgency
blagging/pretexting
use an invented personal scenario to target someone
- know personal details eg name/friends
- from social media/hacked email/official records/dumpster diving
shouldering
observe info as its entered (camera, over shoulder, reflection, overhearing)
advice to avoid social engineering
- be wary of links
- check its httpS
- cover pins/passwords
- dont give out personal info
trojan horse
- program presents itself as something the user wants
- the user downloads it thinking its helpful
- gives OS permission to instal what is actually malware
- the program causes damage/ takes control/provides access to a computer
malicious code vs social engineering
malicious code takes info
in social engineering people give it willingly