cyber security Flashcards

1
Q

what is cyber security

A

consists of the processes, practices and technologies designed to protect networks, computers, programs and data from attack, damage or unauthorised access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

what is malware

A

a form of malicious code designed to cause harm or gain unauthorised access to a computer system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

how can malware get onto a device

A
  • a download from an email attachment
  • hidden on removable media ( USB drive /SD card )
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

what are the typical actions of malware

A
  • deleting/modifying files
    -locking files ( ransomware encrypts all the files on a computer , the user receives a message demanding for large sum of money to be paid in exchange for decryption key )
  • displaying unwanted adverts
  • monitoring the user - spyware secretly tracks the users eg key presses and sends info back to the hacker who may use the info to gain access to passwords or bank details
  • altering permissions - rootkits can give hackers administrator access to devices
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

how can malware be spread between devices

A

as viruses - attach to certain files - users spread them by copying infected files and activate them by opening them
as worms - self replicate without user help and can spread very quickly , they exploit weaknesses in network security
as trojans - malware disguised as legitimate software , users install them without knowing the true intent

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

what is pharming

A

the user is directed to a fake version of the intended website that looks like the real thing , when user inputs all their details onto the website they are actually giving the information to the hackers who can then use the info to gain access to the real account

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

what are some preventions from pharming

A

anti - malware software must be up to date help prevent malware attacks by scanning all incoming data to prevent malware from being installed and infecting a computer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

what is phishing

A

when criminals send emails/ messages to a user claiming to be from a well known business , the emails then leads to the user being sent to an fake website

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

what is social engineering

A

art of manipulating people so they give up confidential information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

what is shouldering

A

observing persons private info over their shoulder – eg pin number prevent – cover pin number / screen guards over devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

what is blagging

A

methods used to obtain info convincingly – act of creating / using invented scenarios that manipulates targeted victims

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

what is penetration testing

A

attempting to gain access to resources without konwledge of usernames , passwords and any other means of access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

explain the difference between the two types of penetration testing

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

what is authentication

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

what is encryption

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

what is trojan

17
Q

what is virus

18
Q

what is spyware

19
Q

what is adware

20
Q

what are ways to reduce risks from malware

21
Q

why is the LEN function more flexible?

22
Q

explain what outdated software

23
Q

explain what are misconfigured access rights

24
Q

why is biometric authentication better than password authentication

25
what are advantages and disadvantages of cloud storage
26
Explain three different electronic methods that could then be used to confirm user identity.
27
what are some methods to detect and prevent cyber security threats
28
how does the DNS work
29
what are the password policies
- minimum length of characters - includes at least one lowercase letter - includes at least one upper case letter - includes at least one symbol
30
what is removable media
is any storage device that can be inserted and removed from a computer
31
why does an operating system have to be updated
as the operating system has full control of the computer or server so if the operating system is infected the entire appliance will be dangerous to the user
32
why does the antivirus /antimalware software need to be updated regularly
so that it can detect new malware
33
how does misconfigured access right pose a risk to a computer system
give users too much access which can be misused
34
how does unpatched/outdated software pose a risk to a computer system
leaves security holes open for hackers to take advantage of
35
what should you look out for in an email to make sure phishing isnt occuring
- greeting - the phishers dont know your name so the greeting isnt personalised -
36
what are some security measures for cyber security
- biometrics - eg finger print scan,retinal scan,voice pattern recognition - very efficient as these are all unique features of a person so great way of authenticating an identity - CAPTCHA -automatic software updates - email confirmation to confirm users identity - password systems - can be made even more secure by following these rules : - minimum length - upper/lowercase numbers and letters - must be continually changed -cant be based on a name