Cyber Security Flashcards

You may prefer our related Brainscape-certified flashcards:
1
Q

What is cyber security consist of?

A

The processes, practices and technologies designed to protect networks, computers, programs and data from attack, damage or unauthorised access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Define cyber security.

A

The protection of computer systems, networks and data from criminal activity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are the 2 major threats to an organisation?

A
  1. data theft
  2. virus infection
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the largest factor in security breaches?

A

Human error

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which factors can cause security breaches?

A
  1. Pharming
  2. Weak and default passwords
  3. Misconfigured access rights
  4. Unpatched or outdated software
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Define pharming

A

A technique intended to redirect a website’s traffic to another, fake site. (major concern for online banking and e-commerce websites)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

How can misconfigured access rights breach security?

A

User names are used to identity the access rights for each user, therefore if employees change roles or have new roles, if there access rights are not carefully managed they may authorise data to them which is not allowed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Define social engineering

A

The art of manipulating people so they divulge personal information such as passwords or bank account details.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What techniques are included in social engineering?

A
  1. Blagging
  2. Phishing
  3. Shouldering
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Define blagging

A

Act of ‘knowingly or recklessly obtaining or disclosing personal data or info without the consent of the controller/owner of data’

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Example of blagging

A

A dishonest employee may persuade a colleague to tell them private information such as their password.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Define Phishing

A

Designed to steal money, get login details, or steal an identity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Example of Phishing

A

Emails

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Define shouldering

A

Refers to using direct observation techniques to gain information such as passwords or security data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Define malware

A

Malware is the term used to refer to a variety of forms of hostile or intrusive software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Define virus

A

A program that is installed on a computer without your knowledge or permission with the purpose of doing harm

17
Q

How are virus’s spread?

A
  • attachment to emails
  • instant messaging services
  • through files, programs or games
  • infected file from a memory stick or a CD/DVD
18
Q

Define spyware

A

A software that gathers information about a person or organisation without their knowledge

19
Q

Define adware

A

Adware analyses which Internet sites a user visits and then presents adverts for products which the user is likely to be interested in

20
Q

Define trojan

A

A program which masquerades as having one legitimate purpose but actually has another. Usually spread by email.

21
Q

What two methods are used to identify vulnerabilities in a network?

A
  • network forensics
  • penetration testing
22
Q

Define network forensics and how it is used

A

Involved capturing, storing and analysing network events, can look at business transactions to verify they are not fraudulent, detect data leaks etc.

23
Q

Define penetration testing

A

Used to find any security weaknesses in a system. It attempts to gain access to resources without knowledge of usernames, passwords and other normal means of access.

24
Q

What is the strategy for penetration testing ?

A
  • gather info about target of possible attacks
  • identify possible entry points
  • attempt to break in
  • report back the findings
25
Q

What happens in black box penetration testing ?

A

Very little info is given about the network prior to the test, to see if hacker can get in and how far they can get

26
Q

What happens in white box penetration testing ?

A

Tester is given basic info about the network in advance of the testing such as IP addresses, network protocols and even passwords.

27
Q

What 3 ways does anti-malware software protect a computer ?

A
  • prevents harmful programs installed
  • prevents important files, such as operating system from being changed or deleted
  • If virus installs itself, software will detect it and remove it
28
Q

What are biometric methods?

A

Fingerprint scan, voice pattern, sample or retinal scan

29
Q

What is CAPTCHA?

A

Completely Automated Public Turing test to tell Computers and Humans Apart