Cyber Security Flashcards

You may prefer our related Brainscape-certified flashcards:
1
Q

What are the 4 methods we use to protect networks?

A

authentication
encryption
firewalls
MAC address filtering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is authentication?

A

Specific logins
(usernames and passwords)
the network manager can also decide which logins need to see which files.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

When would we use authentication?

A

a place with a shared network like a school or company.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is encryption?

A

process of turning plain text into an unreadable form

doesn’t prevent hacking but makes the data impossible to read

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

When would we use encryption?

A

Whenever you need to make sensitive data unreadable to unauthorised access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is a firewall?

A

Software or/and hardware which is configured to only let certain types of traffic through it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

When would you use a firewall?

A

Operating systems come with them pre-installed. large organisations may use more complex firewalls for protection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is a MAC address?

A

Every physical device has its own unique MAC address embedded into it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

How does MAC address filtering work?

A

Can create a whitelist of allowed MAC addresses and only those devices can access certain things.
(does not stop a hacker using one of these devices though)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

When would you use MAC address filtering?

A

Use it on wireless networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is cyber security?

A

Any process, practice or technology designed to protect networks, computers, programs and data from attack/ damage/ unauthorised access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What 6 threats do you have to consider?

A
  • social engineering techniques
  • malicious code
  • weak and default passwords
  • misconfigured access rights
  • removable media
  • outdated software
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is malicious code?

A

Any code used with intent to cause harm to the computer/network/program/data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is penetration testing?

A

attempting to gain access to resources without knowledge of usernames, passwords and other normal means of access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is white box PT?

A

simulates a malicious insider-usually works for the company.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is black box PT?

A

simulates an external hacking attempt