Cyber Security Flashcards

1
Q

What are the legal and professional responsibilities in identifying threats

A

Preventing and mitigating damaged caused by malicious or deliberate attacks require a multi-layered approach

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Types of advanced viruses/scams

A

Brute force attacks Cross-site Scripting Cross-site request forgeryBuffer overloadRemote code executionDirectory traversal

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Types of normal viruses/scams

A

SQL InjectionMan in the middle attacks DDos attackSocial engineering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Types of Cyber defences

A

Firewalls Encryption Access control Anti-virus software Patches and updatesBackupsUser education Network segmentation VPN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Types of Hackers

A

Black hat - Illegal (unauthorised access with malicious intent)White Hat - Legal (Hired to try to hack businesses)Grey Hat - Similar to Black hat but without malicious intent

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Types of firm Security measures

A

Encryption FirewallAnti-virus software Hierarchical access levels

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Define cryptography

A

The practice of securing communication and data through the use of algorithms

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Techniques of cryptography

A

Symmetric key Asymmetric keyHash junctions Digital signatures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Types of Biometrics

A

Fingerprint, facial, voice, eye(iris), signature recognition and behavioural biometrics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Benefits of biometrics

A

Increased security Convenience Reduced fraud Increased accuracy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Drawbacks of biometrics

A

Privacy concernsTechnical limitations CostBias and discrimination

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is a tracert

A

A network diagnostic pool used to track the path taken by data packets from a source computer to another computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is IP address Masking

A

the process of hiding or changing the real IP address ofa device or network to appear as if it originates froma different location or device.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is a “whois”

A

A protocol and database system that stores information about registered domain names and the associated organisations and individuals.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly