Cyber Security Flashcards

1
Q

What is hacking?

A

Automated or manual attempts to gain unauthorised access to programs or data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

How to protect against hacking?

A

Firewall to block access by unauthorised devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is a brute force attack?

A

Automated or manual attempts to gain unauthorised access to secure areas by trying all possible password/key combinations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

How to protect against brute force attacks?

A

Strong passwords
Limited attempts allowed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is data interception and theft?

A

Data may be intercepted during transmission, but physical theft can occur where storage devices or data files are left insecurely

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

How to protect against data interception and theft?

A

Encryption
Passwords
Physical locks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is spyware?

A

Software that hides on your computer and records your activities to send back to a third-party for analysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

How to protect against spyware?

A

Anti-malware
Anti-spyware software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is phishing?

A

Phishing emails redirect a user to a fake website where they trick the reader into divulging confidential information such as passwords that can be used fraudulently

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

How to protect against phishing?

A

Network policy
Firewall
User awareness of phishing ‘clues’

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is pharming?

A

Sends the user to a fake website that looks like the real thing. The user types in a legitimate address and is redirected to a fake website

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

How to protect against pharming?

A

Checking the URL
Making sure the site says HTTPS, not HTTP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is malware?

A

Malicious software written to cause inconvenience or damage to programs or data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is a virus?

A

A program that is installed on a computer without the user’s knowledge or permission with the intent of doing harm.

It includes instructions to replicate automatically on a computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is a worm?

A

A program that is similar to a virus, except it cannot self-replicate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What does anti-virus software do?

A

Software that runs on a computer checking all files for known viruses
It must be updated regularly

17
Q

What is a Trojan horse?

A

A program that masquerades as having one legitimate purpose, but it actually has another

18
Q

How does a Trojan horse work?

A

A link is spread by email

The user is invited to click on a link for an everyday purpose

This link then executes a program which gives the controller unauthorised access to the computer

19
Q

What is ransomware?

A

A form of malware that encrypts a victim’s files.

20
Q

How does ransomware work?

A

A ransom is demanded from the attacker in return for instructions on how to decrypt the files

21
Q

What is adware?

A

A malware that displays onscreen advertisements. It is not always dangerous, but could redirect the browser to an unsafe site

22
Q

What does DDoS stand for?

A

Distributed Denial of Service

23
Q

What is a DDoS attack?

A

A malicious attempt to disrupt the normal traffic of a targeted server with a flood of Internet requests

24
Q

How does a DDoS attack work?

A

Multiple interconnected devices in different locations establish a botnet

The attacker is then able to direct the attack by sending remote instructions to the bots to send requests to the target’s IP address

The server becomes overwhelmed, and genuine requests cannot be handled

The server fails or times out

25
Q

How can you protect against DDoS attacks?

A

A firewall can filter through requests to separate the genuine and fradulent requests

26
Q

What are biometrics?

A

Pre-recorded characteristics to authenticate authorised users of a system/device

27
Q

What are some examples of biometric authentication?

A

Facial recognition
Iris and retina scanners
Fingerprint recognition
Voice recognition

28
Q

What is two-step verification?

A

Two authentication methods performed one after the other to prove someone’s identity

29
Q

What are automatic software updates?

A

These updates will keep applications and the OS up-to-date. This enables bugs and security flaws in the software to be fixed with a patch

30
Q

What does SSL stand for?

A

Secure Socket Layer

31
Q

What does SSL stand for?

A

Provides a secure channel between two computers or device operating over the internet

32
Q

What is SSL used for?

A

SSL is used to secure communication between a web browser and a web server.
It will then use an HTTPS address for the website
Similar to asymmetric encryption

33
Q

What can privacy settings allow a person to do?

A

Control what information about them is shared on a social media platform. A user can control who has access to what they post, and who can see their full profile

34
Q

What could be counted as a proxy server?

A

Any machine that checks and forwards traffic between networks or protocols.

35
Q

What does a proxy server do?

A

It’s an intermediary server that separates end-user clients from their destination site. It can provide varying levels of functionality, security and privacy.