Cyber Security Flashcards
1
Q
Why is cyber security important?
A
- protects data programs and computers against damage, cyber attacks and unauthorised access
- hackers often target organisations to access lots of sensitive information
2
Q
What does penetration testing do?
A
- organisations employ specialists to stimulate potential attacks to identify vulnerabilities to fix
3
Q
Describe the 2 types of penetration testing
A
- white box - stimulates malicious insider with knowledge of system to see what they can do
- black box - external cyber attack - tries to hack organisation in any way
4
Q
What is malware?
A
- malicious software designed to cause harm to gain unauthorised access to a computer system
- without consent
5
Q
What can malware do on a computer?
A
- deletes or modifies files
- locks files
- displays unwanted adverts - adware (pop up ads that can’t be closed)
- monitors user with spyware
- alters permissions using root kits
6
Q
How can malware spread between devices?
A
- Virus = attach themself to files and spread by copying files and activate if opened
- worms= self replicate so spread quickly and exploit weakness in security systems
- Trojans = malware disguised as legitimate software and don’t replicate but users install them not realising their hidden purpose
7
Q
4 types of social engineering
A
- Pharming
- Phishing
- Shouldering
- Blagging
8
Q
Describe pharming:
A
- user directed to fake version of a website
- inputs personal details thinking they’re handing it to a legitimate account
- make sure anti malware is up to date
- use web filters to prevent fake sites
9
Q
Describe phishing:
A
- criminals email or text leading to a fake website
- sent to thousands
- anti-phishing feature (firewall), poor grammar, follow links or update personal details
10
Q
Describe shouldering:
A
- watching over a person’s activity
- watching PIN number or putting password into secured computer
- doesn’t require expertise
- be discreet such as covering the keypad when you enter PIN
11
Q
Describe blagging:
A
- makes up story or pretends to be someone they’re not
- e.g. stuck in a foreign country so to send money
- e.g. phone victim to gain their trust as they pretend to be someone important
- use safety measures that can’t be given away - e.g. biometrics
12
Q
How can networks be protected against threats?
A
- encryption
- anti-malware software
- user access levels
- automatic software updates
- MAC address filtering
13
Q
How can networks be protected with encryption?
A
- when data is translated into a code when only someone with the correct key can access
- cipher text into plain text
- needed to send data over network securely
14
Q
How can networks be protected with anti-malware software?
A
- stops malware from damaging the network
- e.g. firewall examines all data and blocks potential threats
- prevents unauthorised access into the network
15
Q
How can networks be protected with user access levels?
A
- some have higher access levels than others and access to more sensitive data
- limits the number of people with access to important data so prevents attacks within an organisation