cyber security Flashcards

1
Q

what is cyber security

A

consists of the processes, practices and technologies designed to protect networks, computers, programs and data from attack, damage or unauthorised access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

what is malware

A

a form of malicious code designed to cause harm or gain unauthorised access to a computer system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

how can malware get onto a device

A
  • a download from an email attachment
  • hidden on removable media ( USB drive /SD card )
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

what are the typical actions of malware

A
  • deleting/modifying files
    -locking files ( ransomware encrypts all the files on a computer , the user receives a message demanding for large sum of money to be paid in exchange for decryption key )
  • displaying unwanted adverts
  • monitoring the user - spyware secretly tracks the users eg key presses and sends info back to the hacker who may use the info to gain access to passwords or bank details
  • altering permissions - rootkits can give hackers administrator access to devices
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

how can malware be spread between devices

A

as viruses - attach to certain files - users spread them by copying infected files and activate them by opening them
as worms - self replicate without user help and can spread very quickly , they exploit weaknesses in network security
as trojans - malware disguised as legitimate software , users install them without knowing the true intent

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

what is pharming

A

the user is directed to a fake version of the intended website that looks like the real thing , when user inputs all their details onto the website they are actually giving the information to the hackers who can then use the info to gain access to the real account

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

what are some preventions from pharming

A

anti - malware software must be up to date help prevent malware attacks by scanning all incoming data to prevent malware from being installed and infecting a computer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

what is phishing

A

when criminals send emails/ messages to a user claiming to be from a well known business , the emails then leads to the user being sent to an fake website

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

what is social engineering

A

art of manipulating people so they give up confidential information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

what is shouldering

A

observing persons private info over their shoulder – eg pin number prevent – cover pin number / screen guards over devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

what is blagging

A

methods used to obtain info convincingly – act of creating / using invented scenarios that manipulates targeted victims

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

what is penetration testing

A

attempting to gain access to resources without konwledge of usernames , passwords and any other means of access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

explain the difference between the two types of penetration testing

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

what is authentication

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

what is encryption

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

what is trojan

A
17
Q

what is virus

A
18
Q

what is spyware

A
19
Q

what is adware

A
20
Q

what are ways to reduce risks from malware

A
21
Q

why is the LEN function more flexible?

A
22
Q

explain what outdated software

A
23
Q

explain what are misconfigured access rights

A
24
Q

why is biometric authentication better than password authentication

A
25
Q

what are advantages and disadvantages of cloud storage

A
26
Q

Explain three different electronic methods that could then be used to confirm user identity.

A
27
Q

what are some methods to detect and prevent cyber security threats

A
28
Q

how does the DNS work

A
29
Q

what are the password policies

A
  • minimum length of characters
  • includes at least one lowercase letter
  • includes at least one upper case letter
  • includes at least one symbol
30
Q

what is removable media

A

is any storage device that can be inserted and removed from a computer

31
Q

why does an operating system have to be updated

A

as the operating system has full control of the computer or server so if the operating system is infected the entire appliance will be dangerous to the user

32
Q

why does the antivirus /antimalware software need to be updated regularly

A

so that it can detect new malware

33
Q

how does misconfigured access right pose a risk to a computer system

A

give users too much access which can be misused

34
Q

how does unpatched/outdated software pose a risk to a computer system

A

leaves security holes open for hackers to take advantage of

35
Q

what should you look out for in an email to make sure phishing isnt occuring

A
  • greeting - the phishers dont know your name so the greeting isnt personalised

-

36
Q

what are some security measures for cyber security

A
  • biometrics - eg finger print scan,retinal scan,voice pattern recognition - very efficient as these are all unique features of a person so great way of authenticating an identity
  • CAPTCHA
    -automatic software updates
  • email confirmation to confirm users identity
  • password systems - can be made even more secure by following these rules :
  • minimum length
  • upper/lowercase numbers and letters
  • must be continually changed
    -cant be based on a name