Cyber Security Flashcards

1
Q

What is cyber security?

A

Cyber security is the prevention of cyber attacks, and stopping unauthorised access to personal information stored on online and on our devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is accidental damage?

A

Accidental damage is any damage or loss of data which is not intentional

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are examples of accidental damage?

A

Human error
Accidental data file deletion
Software corruption
Hardware malfunction
Natural disasters
Power failure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is malicious damage?

A

Actions that are intended to cause harm to data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are examples of malicious damage?

A

Malware
Phishing and social engineering
DDoS attacks
SQL injection
Insider threats
Ransomware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are the risks with online marketing communications?

A

Spam and unwanted emails
Phishing and scam attempts
Privacy concerns
Ad fraud
Brand safety
Misinformation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are the problems that can arise during online updating of files?

A

Unauthorised access
Man-in-the-middle attacks
Malicious software
Incomplete updates
Denial of service
Rollback attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are examples of malicious software?

A

Virus
Trojan
Worm
Ransomware
Adware
Spyware
Rootkit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is malware’s intended use?

A

Data theft
System disruption
Spamming
Cryptojacking
Extortion

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is human error?

A

Day to day operations involves a lot of data manipulation through typing editing updating and deleting which susceptible to human mistake

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is accidental data file deletion?

A

This is the result of a file or folder being accidentally deleted without an available backup leading to the permanent loss of data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is software corruption?

A

I here software fails and crashes leading to data loss or corruption during data manipulation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is hardware malfunction?

A

Hardware can degrade from damage done to it or mechanical failure, when hardware malfunctions it can cause permanent data loss

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are power failures?

A

When power is disrupted during data manipulation causing for data to be lost

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is malware?

A

Malicious software that infects and damages computer systems and disrupts network operation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is phishing and social engineering?

A

The use of deception to trick individuals into revealing sensitive information or installing malware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What are DDoS attacks

A

DDoS is distributed denial of service,
It is where networks or websites are flooded with traffic to overload them, causing them to be disabled

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is SQL injection?

A

Attackers executing malicious code on servers by injecting it into web applications

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What are insider threats?

A

The intentional harm of stealing sensitive information by employees or insiders

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What is ad fraud?

A

Online advertisement is vulnerable to to being botted which leads to a wasted marketing budget and loss of credibility

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What is brand safety?

A

The safety of the brand’s reputation which can be damaged though ads appearing on inappropriate and offensive sites

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What is misinformation?

A

The spread of false information which leads to confusion and mistrust and potential harm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What is unauthorised access?

A

An attacker that doesn’t have permission gains access to the update server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What are man in the Middle attacks?

A

Attackers intercepts and alters update files during transmission

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

What are incomplete updates?

A

Attackers cause the updates to fail leaving systems in an insecure state making them vulnerable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

What are rollback attacks?

A

Where attackers use old versions of files to carry out attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

What are viruses?

A

Self-replicating programmes that attach themselves to other files and spread to other devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

What are Trojans?

A

A hidden programmes that appears legitimate but performs malicious actions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

What is a worm?

A

A self replicating program that spreads through networks and causes damage to computer systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

What is Ransomware?

A

A type of malware that encrypts a users files and demands payment for the decryption key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

What is adware?

A

A type of software that displays unwanted advertisement

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

What is spyware?

A

A program that collects and sends personal information from a users device without their knowledge

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

What is rootkit?

A

A type of malware that is designed to hide its presence and gives full control of the infected device to the attacker

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

What is data theft?

A

Stealing personal information or confidential data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

What is system disruption?

A

Disrupting the normal functioning of a device or network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

What is spamming?

A

Sending unsolicited emails or messages?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

What is crypto jacking?

A

Secretly using a victim’s device to mine crypto currency

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

What is extortion?

A

Demanding payment in exchange for not carrying out malicious actions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

How can the risks of online marketing organisations be reduced?

A

Implementing strong security protocols
Adhering to privacy regulations
And verifying sources and accuracy of information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

How can risks of online updating of files be reduced?

A

Use secure protocols likes HTTPS or SFTP transmission

Implement digital signatures and hash functions to verify file integrity

Develop a robust incident response plan

Conduct a regular security assessments for system maintenance and updates

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

What are media access control (MAC) addresses? And what are they used for?

A

MAC addresses are unique identifiers assigned to Network Interface controllers (NICs), and are used as network addresses for communication within a network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

What is MAC address spoofing? And what’s it used for?

A

The practice of changing a device’s MAC Address to impersonate another device on a network, it’s used to bypass security measures or evade network monitoring and detection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

What are the risks of MAC spoofing?

A

As it allows users to bypass security measures, attackers can gain unauthorised access violating privacy.

It can also impact the performance of a network as it confuses devices leading to data loss or duplication.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

How can MAC spoofing risks be avoided?

A

Implementation of strong security measures

Regularly monitoring network traffic

Utilising MAC authentication to require valid MAC addresses for network access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

What is blockchain?

A

A decentralised, digital ledger for recording tamper-proof transactiond

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

How does blockchain work?

A

It uses cryptography to secure and validate transactions across a network of computers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

How is blockchain used in cyber security?

A

Decentralised identity management
Secure record keeping
Supply chain security
Cyber threat intelligence sharing
Data privacy
Cyber insurance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

What are the threats of data mining?

A

Data breaches
Unauthorised data sharing
Discrimination
Profiling
Lack of control
Inaccurate data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

Data breaches?

A

Occurs when sensitive information is illegally obtained

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q

Unauthorised data sharing?

A

Companies sharing personal data without an individual’s consent

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
51
Q

Discrimination and profiling?

A

Data mining algorithms unfairly discriminate against specific groups, or profile individuals potentially making them targets to advertisements or discriminatory decision making

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
52
Q

Lack of control and inaccurate data?

A

Users have limited control over their personal information collection and use, which can cause data mining algorithms to produce inaccurate results impacting individuals negatively

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
53
Q

How can the threats of data mining be reduced?

A

Organisations implement strong data protection policies and technologies

Individuals are cautious online

54
Q

Why are large data sets important?

A

It is critical for an originations efficiency and competitiveness in todays digital age

55
Q

Health sector and large data sets

A

Electronic health record hold comprehensive patient data and medical history allowing for better decision in healthcare improving the patient care

56
Q

Finance sector and large data sets

A

Utilises transaction data, credit history and market data for investment decision, fraud identification and risk management.

57
Q

Retail sector and large data sets

A

Use of customer data, sales data and supply chain data to improve marketing, sales and supply chain operations

58
Q

what are the legal and professional responsibilities in cybersecurity?

A

Preventing damage caused by malicious attacks, by having security awareness training, regular updates, penetration testing and incident response planning

59
Q

What is attacking vulnerabilities?

A

identifying and exploiting weaknesses within a system or network for malicious gain

60
Q

What are methods of attacking vulnerabilities?

A

Brute Force Attacks
SQL Injection
Cross-Site Scripting (XSS)
Cross-Site Request Forgery (CSRF)
Buffer Overflow
Remote Code Execution (RCE)
Directory Traversal
Man-in-the-Middle (MitM) Attacks
Denial of Service (DoS) and Distributed Denial of Service (DDoS) Attacks
Social Engineering

61
Q

What is defending from threats?

A

Measures taken to prevent, detect, and respond to attacks on a system or network.

62
Q

What are methods of defending from threats?

A

Firewalls
Encryption
Access Control
Antivirus Software
Patches and Updates
Backups
User Education and Awareness Training
Network Segmentation
Intrusion Detection and Prevention Systems
Virtual Private Network (VPN) Technology

63
Q

What is encryption?

A

A security measure which uses a mathematical algorithm to convert plaintext into unreadable ciphertext.
It protects data from unauthorised access

64
Q

What is a firewall?

A

Security measure regulating incoming and outgoing network traffic based on rules and policies.
It acts as a barrier between trusted internal networks and untrusted external networks.

65
Q

What are the types of firewalls?

A

Hardware based
Software based

66
Q

How do firewalls work?

A

Packet-Filtering: Examines packet headers based on source, destination, IP address, and port number.
Stateful Inspection: Tracks conversation or “state” of connections for informed traffic decisions.
Application-Level Gateways: Inspects data at the application layer, understanding specific application-level protocols.

67
Q

What is an antivirus software?

A

A security measure that detects, prevents and removes malware, it is installed onto a users devices and constantly monitors the device.

68
Q

What techniques are used in an Antivirus Software?

A

Signature-Based Detection: Compares code to a database of known malware signatures.

Heuristic-Based Detection: Looks for patterns or behaviors typical of malware.

Behavioral-Based Detection: Monitors program behavior to identify malicious activity.

69
Q

What happens once malware is detected?

A

Quarantine: Isolates malware to prevent further system damage.

Deletion: Removes malware entirely from the system.

Repair: Attempts to reverse damage caused by the malware.

70
Q

What is hierarchal-access levels?

A

Divides system or network access into different tiers with distinct privileges and restrictions. This limits the damage done by unauthorised access.

71
Q

What is cryptography?

A

Securing communication and data through mathematical algorithms.

72
Q

What is the purpose of cryptography?

A

Confidentiality: Encrypts data for authorized party access.

Integrity: Protects data integrity via digital signatures or authentication codes.

Authenticity: Verifies sender identity using digital certificates or public key infrastructure.

73
Q

What is symmetric key cryptography?

A

Uses the same secret key for both encryption and decryption.
Both parties require a copy of the secret key for communication.

74
Q

What is asymmetric key cryptography?

A

Uses a pair of keys for encryption and decryption.
Keys are not identical; one is public, the other is private.

75
Q

What is Hash Function cryptography?

A

Generates unique digital fingerprints for file verification.
Uses algorithms like SHA-256, SHA-512.

76
Q

What is digital signatures cryptography?

A

Ensures sender authenticity.
Sender uses private key, recipient verifies with public key.

77
Q

What is steganography?

A

Hides messages within other files like images or audio.
Conceals the existence of data.

78
Q

What is random number generator?

A

Generates random numbers for security applications.
Utilized in encryption keys and digital signatures.

79
Q

What is quantum cryptography?

A

Uses principles of quantum mechanics for secure communication.
Considered more secure than traditional methods.

80
Q

Compare symmetric and asymmetric key cryptograph

A

Symmetric: Uses one key for encryption and decryption, faster but requires secure key exchange.
Asymmetric: Uses different keys for encryption/decryption, eliminates need for key sharing, slower and computationally more expensive.

81
Q

What is biometrics?

A

Biometrics is the use of unique physiological or behavioural characteristics to identify individuals.

82
Q

What is fingerprint recognition?

A

Uses unique fingerprint patterns for identity verification.

83
Q

What is facial recognition?

A

Verifies identity using distinct facial characteristics.

84
Q

What is iris recognition?

A

Utilizes unique iris patterns for identification.

85
Q

What is voice recognition?

A

Identifies individuals based on their unique voice characteristics.

86
Q

What is signature recognition?

A

Uses unique signature characteristics for verification.

87
Q

What is behavioural biometrics?

A

Identifies individuals based on behavioural traits like typing rhythm or mouse movements.

88
Q

What is the benefit of biometric authentication?

A

Provides high security and convenience, reduces fraud and accuracy in authentication

89
Q

What is the disadvantage of biometric authentication?

A

Privacy concerns, technical limitations, it is expensive to implement and maintain, and there is the potential of bias and discrimination.

90
Q

What is black-hat hacking?

A

Obtaining unauthorised access to systems with malicious intent

91
Q

What is white-hat hacking?

A

Improves security by identifying system vulnerabilities, helps prevent cyber-attacks and identifies weaknesses enhancing security.

92
Q

What is penetration testing?

A

Used to simulate attacks and is used to
evaluate the security of a system. It identifies security vulnerabilities and weaknesses providing with recommended improvements.

93
Q

What is tracert (Tracer route)

A

a network diagnostic tool used to track the
path taken by data packets from a source computer to a destination computer

94
Q

What is whois protocol?

A

a protocol and database system that stores
information about registered domain names and the associated organisations and individuals.

95
Q

What is IP address masking and impersonating?

A

the process of hiding or changing the real IP address of a device or network to appear as if it originates from a different location or device.

96
Q

What is cyber resilience?

A

the ability of to withstand and quickly recover from cyber-attacks, system failures and other security incidents

97
Q

What are the consequences of a cyber attack to a company?

A

Financial Loss
Reputational Damage
Legal Liability
Intellectual Property Theft
System Downtime

98
Q

What are the types of data loss?

A

Temporary and permanent

99
Q

What is temporary data loss?

A

Temporary data loss is where data that is lost can easily be recovered from backups or recovery processes

100
Q

What is permanent data loss?

A

Permanent data loss is where data is lost completely and irreversible

101
Q

How do you avoid permanent data loss?

A

Implementing proper data backups and disaster recovery procedures
Regular software and system updates
Physical security for storage devices
Regular backups

102
Q

What can damaged or corrupt software lead to?

A

System crashes
Data Losses
Security Risks
Inefficiency
Compatibility Issues

103
Q

In what ways are companies effected by their website being unavailable?

A

Loss of Reputation
Loss of competitive advantage
Legal and social implications
Financial Issues

104
Q

Loss of Reputation because of a website being down is caused as there is?

A

Poor user experience, leading to decreased trust.
Brand image tarnishing.
Penalties in search engine rankings.

105
Q

Loss of competitive advantage because of a website being down is caused as there is a?

A

Reduced market share.
Missed business opportunities.
Decreased visibility and brand reputation damage.

106
Q

The legal and social implications of a website being unavailable are

A

Legal liabilities and contractual breaches.
Reputational damage and loss of trust.
Increased customer complaints.

107
Q

The financial loss because of a website being down is due to the

A

Reduced revenue and increased costs.
Decreased ad revenue and search rankings.
Loss of customers and market share.

108
Q

The resilience controls to prevent cyber attacks are?

A

Boundary firewalls and Internet gateways
Secure system configuration
Access control
Malware Protection
Patch Management
Staff Training

109
Q

How does Boundary firewalls and Internet gateways prevent cyber-attacks?

A

Boundary firewall monitors and controls network traffic.
Prevents unauthorised access, malware infections and hacking attempts.
Internet gateway aids in secure data exchange and prevents cyber-attacks using firewalls, intrusion detection systems, and VPNs.

110
Q

How does Secure system configuration prevent cyber-attacks?

A

Admin account access controls and audit trails.
Account management and regular backups.
Provides multiple layers of protection, reducing the attack surface and increasing visibility to respond to security incidents.

111
Q

How does Access control prevent cyber-attacks?

A

Limits individuals accessing sensitive data and systems.
Reduces the attack surface, minimises the risk of unauthorised access, theft and manipulation.
Strengthens security posture and reduces the likelihood of successful cyber-attacks.

112
Q

How does Malware protection prevent cyber-attacks?

A

Detects and blocks malicious software
Prevents harm, data theft, and unauthorised access.
Utilises antimalware software, firewalls, and other security measures to reduce the risk of malware-based cyber-attacks.

113
Q

How does Patch management prevent cyber-attacks?

A

Regularly updates software to close security vulnerabilities.
Protects against new threats and maintains compliance with industry regulations.
Identifies, acquires, tests, and installs patches to prevent cyber-attacks.

114
Q

How does Staff training prevent cyber-attacks?

A

Raises employee awareness of cyber threats.
Teaches safe computing practices and ensures compliance with security policies.
Facilitates early detection of potential cyber-attacks through informed employees.

115
Q

The resilience controls to recover from cyber-attacks are?

A

Alternative Facilities
What-If Scenarios
Regular Backups of data

116
Q

How do alternative facilities recover from cyber-attacks?

A

Provides options if primary locations are affected by cyber-attacks.

117
Q

How do What-if scenarios recover from cyber-attacks?

A

Identifies attack vectors, evaluates impact, and prioritizes response efforts.

118
Q

How do Regular Backups recover from cyber-attacks?

A

Helps restore lost data, minimizing operational impact.

119
Q

What are the Legal and Professional Responsibilities for Resilience Controls

A

Compliance with laws (GDPR, NISR) and standards (ISO 27001, Cyber Essentials).

Responsible for protecting personal data and preventing unauthorized access.

Duty to ensure continuity of critical business functions through business continuity planning and disaster recovery strategies.

Ensuring security and confidentiality of sensitive information like financial data and intellectual property.

120
Q

What is social engineering?

A

Social engineering attacks use deception and manipulation to trick users into revealing sensitive information or making mistakes that compromise the security of their devices.

121
Q

What is phishing?

A

Cyber-attack seeking sensitive data through deceptive emails, texts, or websites impersonating trusted entities.

122
Q

What is vishing?

A

Voice Phishing, Social engineering attack using voice calls, voicemails, or IVR systems to extract sensitive information.

123
Q

What is baiting?

A

A social engineering attack involving leaving a physical item (USB, CD) in public spaces to entice victims into using it on their devices.

124
Q

What is email hacking?

A

The unauthorised access or manipulation of someone else’s e-mail account or e-mail messages.

125
Q

What is pretexting?

A

A method where false scenarios or cover stories are used to manipulate individuals into disclosing sensitive information or performing actions.

126
Q

What is quid pro quo scams?

A

A social engineering attack where an attacker offers something valuable to a victim in exchange for sensitive information or computer access.

127
Q

What is passive digital footprints?

A

Passive digital footprints are data or information inadvertently left behind due to online activities, like browsing history, social media posts, or IP addresses.

128
Q

What is active digital footprints?

A

Active digital footprints result from actively sharing information online via social media, email, or messaging.

129
Q

How can your digital footprint be exploited?

A

In a cyber-attack campaign, attackers leverage passive and active digital footprints to access systems and steal sensitive information.

130
Q

Social engineering and the legal requirement in the UK

A

Computer Misuse Act 1990: Criminalizes unauthorized system access via hacking or cyber-attacks.

Fraud Act 2006: Criminalizes deception causing gain or loss, encompassing social engineering scams like phishing and vishing.

GDPR: Enforces personal data protection, mandates timely data breach reporting to the ICO.

Privacy and Electronic Communications Regulations 2003: Regulates electronic communication services, requiring consent for marketing messages and opt-out options for individuals.