Cyber Security Flashcards

You may prefer our related Brainscape-certified flashcards:
1
Q

Ways of preventing brute force attacks on user passwords

A
  • Strong password

- 2 factor authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Social engineering

A

Process of influencing people into giving away confidential information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Types of social engineering methods

A

blagging, pharming, phishing, shouldering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Blagging

A

using false pretenses to obtain personal information from you - made up stories/pretends to be someone they arent to persuade victim to share
OR persuading often by use of a fake scenario to ask users to share personal data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Pharming

  • how is it usually carried out
A

Setting up a fake website that looks like an official website for a reputable organisation to try and harvest personal data

  • by using malware that automatically redirects people from legitimate sites to fake one
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

how to prevent pharming

A

anti malware software, up to date

- web filters

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

how to prevent blagging

A
  • use security measures that can’t be given away e.g. biometrics
  • look out for bad grammar, alternate email address
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

what is phishing, how to prevent

A

When cyber criminals pose as a trustworthy organisation to attempt to trick people into giving away sensitive info
- only allow emails from known sources, look out for bad grammar !

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

what is shouldering, how to prevent

A

Observing a legitimate user entering data into a computer system
- be discreet while entering passwords/ PIN numbers, careful placement of terminals/ATM’S

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Malware

A

malicious software designed to cause harm/gain unauthorised access to a computer system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Virus

A

attach to certain files, users spread by copying infected files + activate by opening

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Worms

A

self-replicate w out user help - quick spread

- exploit weaknesses in network security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

trojans

A

disguised as legitmate software - dont replicate, users install them w out realising hidden purpose

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Ways to protect networks

A
  • encryption
  • anti-malware software
  • user access levels
  • automatic software updates - patch security holes in software
  • MAC address filtering
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Anti-malware software

firewalls

A

designed to stop malware from damaging network + devices on it
- firewalls examine all data entering and leaving a network + block potential threats,
used to prevent unauthorised access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

User access levels

A

control which parts of network diff groups of users can access - limit people w access to important data = PREVENT ATTACKS WITHIN organisation

17
Q

MAC address filtering

A

Makes sure only people on network are trusted users, checks unique identification address of each device that tries to connect to the network
- only allowed devices can join

18
Q

User authentivation

A

Passwords, Biometrics, email confirmation, CAPTCHA

19
Q

General strategies for reducing risk of social engineering

A
  • train/educate users
  • performs frequent tests of security measures
  • appropriate security protocols for handling sensitive data
20
Q

Authentication

A

Ensuring a user is who they are claiming to be

21
Q

Encryption

A

Changing data so that it cannot be read

22
Q

Spyware and adware , Trojan + viruscomparison

A

Spyware tracks what a user is doing, adware doesn’t

  • adware doesn’t do any harm to a computer system but trojans, spy ware and virus do
  • users sometimes choose to install adware
  • spyware + trojans Installed without knowing , virus spread W out user knowing
  • spyware + adware work in same ways
  • all 4 types disruptive
23
Q

Penetration testing

A

Specialists employed to stimulate potential attacks

- identifies possible weaknesses so vulnerabilities can be fixed

24
Q

White box testing

A

Stimulates malicious INSIDER w knowledge of the current system
- person given user credentials to mimic what could happened if an employee turned

25
Q

Black box testing

A

Stimulates an EXTERNAL CYBER ATTACK

- not given any credentials, will try and hack the organisation in any way they can

26
Q

typical actions of malware

A
  • Deleting + modifying files
  • locking files: ransomware encrypts all the files on a computer
  • Displaying unwanted adverts - adware can cause popup ads CANNOT BE CLOSED
  • Monitoring the user - spyware secretly tracks actions like key presses + sends info to hacker (can work out pswds, bank details
  • Altering permission
27
Q

Biometrics

A
  • use scanners to identify people by unique parts of body e.g. fingerprints, retina
  • EXPENSIVE but usually quite secure + convenient