Cyber security Flashcards

1
Q

what is data?

A

data is raw facts and figures, information is created when that data has been processed and becomes meaningful

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

data collected by the media

A

personal information, content they provide, user activity, data of others

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

risk of compromised data

A

human error arguably creates the largest risk of the data being compromised

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

social engineering

A

social engineering is a set of method used by cybercriminals to deceive individuals into handing over information that they can use for fraudulent purposes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

phishing

A

A phishing attack is an attack in which the victim receives an email disguised to look as if it has come from a reputable source, in order to trick them into giving up valuable data. The email usually provides a link to another website where the information can be inputted.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

blagging

A

the act of inventing a specific scenario to try and engage with the victim, which in turns gives the attacker money or information e.g. emails

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

shouldering

A

 shouldering is when you are trying to get someone’s
Password from their ATM by standing behind them and
Looking over their shoulder for their personal information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

scam email warning

A

 look for spelling errors
 look for suspicious links
 see if it was trying to get your bank details.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

hacking

A

Hacking in the context of cyber security is:
Gaining unauthorized access to or control of a computer system, people want to hack to steal personal data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

malware

A

Malware (malicious software) is software
that is designed to gain access to your
computer with malicious intent.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

malware e.g.

A

Disabling hardware
● Data theft
● Forced advertising
● Sending email spam
● Extorting money

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Categories of malware

A

viruses
worms
trojan
adware
ransomware
spyware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

ransomware

A

This is a form of virus, as it is self-replicating. Specifically, ransomware locks a computer, encrypts files, and therefore prevents the user from being able to access the data. The attacker will demand that a ransom be paid before they decrypt the files and unlock the computer. 

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

virus

A

virus is a malicious form of self-replicating computer programs. Once on a computer or network, a virus will replicate itself by maliciously modifying other computer programs and inserting code. For a virus to infect a system, it needs to be initiated/executed by a user.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

catching a virus

A

● Download an email attachment
● Click a confirmation button on a pop-up
without reading it
● Download files such as movies or games
from illegal websites of peer-to-peer
file-sharing platforms

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

worms

A

Worms replicate themselves but do not
attach themselves to files as a virus does.
Instead, worms spread through the
network and use the system’s resources.
Most worms cause problems by using up
network bandwidth and therefore
slowing down the network significantly.

17
Q

ransomware

A

This is a form of virus, as it is selfreplicating.
Specifically, ransomware locks a
computer, encrypts files, and therefore
prevents the user from being able to
access the data.
The attacker will demand that a ransom
be paid before they decrypt the files and
unlock the computer.

18
Q

WannaCry ransomware attack May 2017

A

This attack is estimated to have affected
over 200,000 computers across 150
countries.
It exploited a known security flaw with
Microsoft Windows.
All versions of Windows that hadn’t
applied the update released in April 2017
were at risk. This included older versions
of Windows that were no longer getting
updates

19
Q

trojans

A

A trojan is a piece of software that
appears to perform a useful function
(such as a game) but unbeknown to the
user it also performs malicious actions.
For example, it might open a ‘back door’
to give an attacker remote access to your
computer.
The name derives from the story of the
Trojan Horse.

20
Q

spyware

A

Spyware is unwanted software that
monitors and gathers information on a
person and how they use their computer.
This can include monitoring your internet
usage to send you harmless but annoying
adverts.
More sinister spyware will include
keyloggers that record every keystroke
made by a user.

21
Q

adware

A

Adware can be a worm, virus, or Trojan. It
infects a computer and causes it to
download or display malicious adverts or
pop-ups when the victim is online.
If you are online and see a large number
of adverts, or you are receiving pop-ups
when you’re offline, then your computer
might have been infected by malware.

22
Q

internet bots

A

Bots are automated programs that perform
tasks repeatedly.
Bots are a crucial part of the internet’s
infrastructure and perform useful tasks such
as:
● Finding new websites for search engines
to index
● Providing customer service online
(chatbots)
● Monitoring the prices of items to find the
best deal (shopbots)

23
Q

bots that go bad

A

Many of the bots circulating the web
have malicious intent.
Bots can be used to create social media
accounts and to follow certain users to
increase people’s perception of their
influence.
Bots can also be used to scour the web to
look for and report back on vulnerabilities
of internet-connected devices

24
Q

botnet

A

A botnet is a large collection of malware infected devices (zombies).
An attacker (‘bot herder’) chooses when
to ‘wake’ the zombies to perform an
attack.
This might be to send multiple requests
to a single server

25
Q

malware

A

a file or code, typically delivered over a network, that infects, explores, steals or conducts virtually any behavior an attacker wants.

26
Q

UK laws relevant to cyber security

A

The computer Misuse Act 1990 is the main cybersecurity act that regulated the UK’s digital relationship between individuals and malicious parties. It is enforced directly with the Data protection Act 2018 and the UK-GDPR, which protects residents’ personal data

27
Q

Types of hackers

A

Black hat hackers: Malicious hacker

White hat hackers: Ethical hacker

Grey hat hackers: Not malicious but not always ethical

28
Q

DDos Attack

A

DDos (Distributed Denial of service) Attack is a cybercrime where the attacker floods a server with internet traffic to prevent users from accessing connected online services and sites.

29
Q

good password practices

A

-never reveal your passwords to others
-use a password manager
-use passwords for different accounts
-length and complexity (12 characters or more)
-a combination of uppercase letters, numbers, symbols etc.

30
Q

Antivirus Software

A

A program or set of programs that are designed to prevent, search for, detect and remove software viruses.