Cyber Security Flashcards

You may prefer our related Brainscape-certified flashcards:
1
Q

What is cyber security ?

A

protecting computers , programs and data from attack or damage from unauthorised access through technologies.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Cyber Security Threats

A
  • social engineering
  • malicious code
  • weak and default passwords
  • misconfigured access rights
  • removable data
  • unpatched and or outdated software
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Name two technology solutions

A

anti - virus software - needs to be kept up to date

web filter - block access to web pages with malicious code and needs to be kept updated

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Name two process solutions

A
  • require user login
  • minimise the access rights users have
  • require regular password changes
  • make sure o.s up to date
  • regularly back up data to minimise that effect of an attack.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Examples of security measures

A
  • bio metrics
  • e-mail confirmation ( 2FA )
  • password systems
  • automatic software updates
  • CAPTCHA
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Name two practice solutions

A
  • do not share password
  • use a strong password
  • do not download files without knowing they are safe
  • do not click on links without knowing they are safe`
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Forms of social engineering

A
  • Blaggering
  • Phishing
  • Pharming
  • Shouldering
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is Blagging ?

A

inventing a scenario to trick someone in to handing over personal data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is Phishing ?

A

inserting a malicious link in an email or text that looks like it is safe

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is Pharming ?

A

redirecting a safe web address to a malicious one using malware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is Shouldering ?

A

looking over a someone’s shoulder

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is Malware ?

A

malicious code designed to work in ways to mistreat or harm the user

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

5 tips to stay safe

A
  • read messages carefully before clicking
  • hard passwords
  • do not turn off the firewall
  • be careful with public networks
  • download files only from reliable websites
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Forms of malware

A
  • viruses
  • trojan
  • spyware
  • adware
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Viruses

A

self replicating software that immediately or at some point damages the device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Trojans

A

pretend to be legitimate software in order to get installed and will do something malicious at some point

17
Q

Spyware

A

hidden software that sends sensitive data to the attacker

18
Q

Adware

A

pops up advertisements and links and slows down device

19
Q

CAPTCHA

A

the idea is to present the user with a task that only a human can read, understand, or do. CAPTCHA systems are most commonly encountered on the internet when opening an account with a service.

20
Q

Email Verification

A

An email is sent to the user’s email address and they have to click on a link in it to confirm that the email address is theirs. This links the user’s email to an account and prevents bots from opening fake or numerous accounts with false email addresses.

21
Q

Mobile Phone Verification

A

Similar to email verification but with a text

The mobile phone number entered may also be used for two-factor authorisation, whereby a user cannot access their account on a new computer by password alone, but must also enter a code sent to their phone.

22
Q

White box Test

A

White-box testing is a penetration test that uses detailed insider knowledge of the target system to improve the tests.

The aim is to simulate an attack by a malicious insider who has knowledge of the target system, and possibly basic credentials.

23
Q

Benefits of white box tests

A

Benefits:

  • Deep and more detailed testing.
  • Less testing time required.
  • Tests things such as quality of code and application design.
24
Q

Disadvantages of white box tests

A

Disadvantages:

  • This is an unrealistic attack from the perspective of an uninformed attacker from outside the organisation.
25
Q

Black Box Tests

A

In contrast to white-box tests, black-box penetration tests require no previous information and take the approach of an uninformed attacker.

The aim is to simulate an external hacking or cyber warfare attack.

26
Q

Benefits of Black Box Tests

A

Benefits:

- Simulates a realistic scenario.

27
Q

Disadvantages of black box tests

A

Disadvantages:

  • Tests can take longer to perform.
  • Some areas of the infrastructure and software may remain completely untested.