Cyber Security Flashcards
In order to create a strong, secure password what must it contain?
It has to be something difficult, if it is personal try make it something people don’t know about you. It should contain a mix of capitals and lower case letters, numbers and special characters Ex/ StR0ngP@Ssw0rD1967!
What are other ways you can secure data and accounts other than a single password?
2 factor authentication (2FA), something specific like entering a code sent to your phone, fingertip recognition, Face ID and voice recognition
What is a white hat hacker?
A white hat hacker is employed and paid by companies to legally hack into their data and software in order to exploit any problems so the company is able to fix it and make their account more secure
What is a black hat hacker?
Black hat hackers are illegal hackers, these guys will hack into software with malicious intent and when they find a weakness they will exploit it, some even put it on the dark web for sale so other people can access it
What is a grey hat hacker?
Grey hat hackers are a mix of both black and white. They will go hacking into software without permission but when they find something they will go to the company and ask for a small fee for helping them spot a problem. However if the company refuse or decline the hacker will then exploit the weakness. This is still illegal as the hacker never had permission
What is the Computer Misuse Act?
In the UK, the Computer Misuse Act is the law used most frequently to charge people who have used technology illegally
What does every file ok your computer have?
A file extension
What is a file extension?
A file extension identifies a type of data stored and the program it would open in
What are some file extensions?
Word processing document, presentation, sound file, video file, acrobat file, picture and web page
How do hackers use file extension to share unwanted data and bugs?
Hackers will change the file extension and send it to people in order to trick people into opening the file when really it can contain bugs, viruses and unwanted data
How can we find out more information about an image?
We can run a reverse Google search meaning we can enter a photo and Google will provide similar searches and information on the photo
What does a reverse google search allow you to figure out?
You can figure out when the photo was taken and were it was taken
What do file properties allow you to figure out?
File properties allow you to access additional information about the phone like the pixels, if the photographer used the flash and when it was last modified
What dies EXIF data stand for?
EXIF is short for Exchangeable Image File
What is a MD5 Hash File?
And MD5 hash is the products of cryptographic algorithms, complicated mathematical operations preformed on the contents of a file designed to price a string of numbers unique to that file