Cyber Security Flashcards

You may prefer our related Brainscape-certified flashcards:
1
Q

What is malware?

A

Malware is software that has been purposely developed to damage, disrupt or take control of computer systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is social engineering?

A

Social engineering is techniques to manipulate people into giving away confidential and personal information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is misconfigured access rights?

A

When users only have access to files that they need but sometimes they have access that they should not.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Why should you update your software often?

A

Software needs regular updates to fix vulnerabilities in computer systems. Software that remain unpatched are vulnerable to attacks?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is Penetration testing?

A

It is legal testing of an organisations system to see if there are any vulnerabilities that an attack could exploit in there network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is white box penetration testing?

A

When testers are given some information about the network, for example, IP address, source code before they attack the network.

Designed to prevent a inside attack.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is black box penetration testing?

A

When they are given little or no information about the network before the test.

Designed to prevent an outside attack.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the difference between black box and white box penetration testing?

A

Black box - little to no information before the test.

White box - Some information before the test like IP Address.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is a computer virus?

A

Computer viruses replicate themselves and transfer from one computer to another.

They are activated by a user usually by email attachment, attachment to other files and programs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is a trojan?

A

Trojan gains access to a computer by pretending to be a legitimate software.

Allows unauthorised backdoor access to a computer without the user being aware.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is spyware?

A

Spyware records the activity on your computer, like keystrokes, thereby logging your passwords and is sent back to the hacker.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is adware?

A

Adware includes popups that are automatically installed to your computer which can slow it down.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is worms?

A

Worms spread like viruses but do not require human intervention.

They attach themselves to network tools to spread automatically around a network quickly

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Name 6 ways to detect / prevent cyber security threats.

A
  1. Biometric measures (Fingerprints)

2.Automatic software updates

  1. CAPTCHA (Using images to see if its a bot or human)
  2. Password systems
  3. Using a email for confirmation
  4. Anti virus software (Scans computer to find malware)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is blagging

A

Blagging is when scenarios are made up to con victims, into revealing stuff they wouldn’t usually.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is Phishing?

A

Usually an email or text message scam where they are impersonating a company to give sensitive personal information.

Example: Someone impersonating your bank

17
Q

What is Pharming?

A

Users are redirected to a fake website that they believe is real to make the user enter personal info.

18
Q

What is Shoulder surfing?

A

When someone looks over your shoulder to see what personal information is being typed.

Example: Shouldering over an ATM Machine for your pin.

19
Q

Explain 2 ways to prevent blagging.

A

Use biometric measures because these cant be made known.

Ensure you have privacy settings on social media so fraudsters cant find information about you.

20
Q

Explain 2 ways to prevent Phishing.

A

Be aware of suspicious texts, emails, and phone calls. Official organisations will never ask for personal information.

Apply email filtering to prevent suspicious emails getting through.

21
Q

Explain 2 ways to prevent Pharming.

A

Check URL in the web address.

Website filter to filter suspicious websites.

22
Q

Explain 2 ways to prevent shoulder surfing.

A

Be aware of whose around you when typing your information

Place computers in locations that make shouldering difficult