Cyber Security Flashcards

1
Q

In order to create a strong, secure password what must it contain?

A

It has to be something difficult, if it is personal try make it something people don’t know about you. It should contain a mix of capitals and lower case letters, numbers and special characters Ex/ StR0ngP@Ssw0rD1967!

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are other ways you can secure data and accounts other than a single password?

A

2 factor authentication (2FA), something specific like entering a code sent to your phone, fingertip recognition, Face ID and voice recognition

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is a white hat hacker?

A

A white hat hacker is employed and paid by companies to legally hack into their data and software in order to exploit any problems so the company is able to fix it and make their account more secure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is a black hat hacker?

A

Black hat hackers are illegal hackers, these guys will hack into software with malicious intent and when they find a weakness they will exploit it, some even put it on the dark web for sale so other people can access it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is a grey hat hacker?

A

Grey hat hackers are a mix of both black and white. They will go hacking into software without permission but when they find something they will go to the company and ask for a small fee for helping them spot a problem. However if the company refuse or decline the hacker will then exploit the weakness. This is still illegal as the hacker never had permission

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the Computer Misuse Act?

A

In the UK, the Computer Misuse Act is the law used most frequently to charge people who have used technology illegally

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What does every file ok your computer have?

A

A file extension

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is a file extension?

A

A file extension identifies a type of data stored and the program it would open in

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are some file extensions?

A

Word processing document, presentation, sound file, video file, acrobat file, picture and web page

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

How do hackers use file extension to share unwanted data and bugs?

A

Hackers will change the file extension and send it to people in order to trick people into opening the file when really it can contain bugs, viruses and unwanted data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

How can we find out more information about an image?

A

We can run a reverse Google search meaning we can enter a photo and Google will provide similar searches and information on the photo

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What does a reverse google search allow you to figure out?

A

You can figure out when the photo was taken and were it was taken

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What do file properties allow you to figure out?

A

File properties allow you to access additional information about the phone like the pixels, if the photographer used the flash and when it was last modified

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What dies EXIF data stand for?

A

EXIF is short for Exchangeable Image File

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is a MD5 Hash File?

A

And MD5 hash is the products of cryptographic algorithms, complicated mathematical operations preformed on the contents of a file designed to price a string of numbers unique to that file

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

How can you determine if a file has been hacked comparing it to its original hash?

A

Even the slightest adjustment to a file will change the hash number therefore you can compare it to the original to check if it’s been tampered with

17
Q

What is steganography?

A

Steganography is the privative of hiding a secret message inside of something that is not secret Ex/ embedding a secret message or script inside a word or excel document

18
Q

What is the purpose of steganography?

A

The purpose of steganography is to conceal and deceive. It is a form of convert communicate and can use any sort of medium to hide messages

19
Q

What is a penetration test?

A

A penetration test is an authorised simulated cyber attack on a system to see how secure it is from real attacks

20
Q

What is ethical hacking?

A

Hacking done to help improve security

21
Q

What’s a common example of a phishing attack?

A

An email from an unknown asking to click a link to confirm details

22
Q

What is the main goal of forensic analysis in digital forensics

A

To analyse the contents of a file

23
Q

What is an example of steganography?

A

Hiding data in plain sight

24
Q

What is a disadvantage of steganography?

A

It is difficult to detect making it popular between criminals who want to conceal their activities

25
Q

What does running a reverse google search on an image help to do?

A

It helps to determine the origin and usage history of the image

26
Q

What is phishing?

A

An email scam that attempts to steal personal information

27
Q

What is social engineering?

A

A type of software that steals your personal information

28
Q

What is 2FA

A

A security system that requires two forms of authentication

29
Q

Why are OS updates important?

A

To fix bugs and security vulnerabilities

30
Q

In digital forensics what is an MD5 Hash used for?

A

Detecting changes or tampering in files

31
Q

What are the risks of unsecured WiFi networks?

A

Unauthorised access to personal data

32
Q

What is the purpose of editing a file extension?

A

To hide the true format of a file