Cybersecurity Flashcards

1
Q

What is cybersecurity?

A

Cybersecurity consists of the processes, practices and technologies that protect networks, computers, and programs from damage or unauthorised access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is social engineering?

A

Social engineering involves manipulating people into giving up sensitive, confidential information like PIN codes and passwords.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is malicious code?

A

Malicious code is software written with the intent to harm, damage or breach a computer system or a network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are the dangers of weak or default passwords?

A

Passwords that are common or easy to crack can be easily used by hackers to divulge sensitive confidential information, which is detrimental to the user.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are the dangers of misconfigured access rights?

A

If the wrong users are given incorrectly configured access, they could harm the computer network or steal confidential information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is removable media?

A

Removable media are storage devices. If these storage devices contain malware, they can transfer them to the computer system. If the computer itself is connected to a network, then the risk of infecting all the computers in the network is run.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are the dangers of unpatched/outdated software?

A

Patching is the process of updating software to fix a problem or add a new feature.

If outdated software is used, hackers might develop an exploit around it and therefore gain access to the system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is penetration testing?

A

Penetration testing is the simulation of the same techniques that a hacker would use to infiltrate a system. However, this is done with the intent of finding weaknesses within the system that can be then patched rather than to steal data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is white box testing?

A

It is a way of software testing in which the internal structure or the program or the code is known to the tester.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is black box testing?

A

It is a way of software testing in which the internal structure or the program or the code is hidden and nothing is known about it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is blagging?

A

Blagging is the act of creating a fake scenario to manipulate a victim to divulge sensitive information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is phishing?

A

Phishing is the impersonation of a familiar entity to steal data or sensitive information from a user.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is pharming?

A

Pharming is the criminal act of redirecting one website’s traffic to another to lure unsuspecting victims to enter their login information which can then be used to compromise the account.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is shouldering?

A

Shouldering is observing a person’s private information over their shoulder eg PINs at ATMs or passwords in busy places

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is malware?

A

Malware is software written and distributed with the intent to harm a computer system/network or steal private information from it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

List 5 ways to secure a computer network.

A
  • Antivirus software
  • Firewalls
  • Encryption
  • Secure passwords
  • Access levels
16
Q

What is antivirus software?

A

Anti-virus software is software that is designed to detect and block attacks from malware programs.

17
Q

What is a firewall?

A

A firewall blocks unexpected communications into or out of a network, therefore preventing suspicious activity.

18
Q

What are secure passwords?

A

Secure passwords that cannot be guessed easily prevent hackers from compromising the integrity of a network and stealing a user’s identity.

19
Q

What are access levels?

A

Access levels are restrictions on access to certain pieces of information or control over a device. Incorrectly configured access can grant the wrong users access to more ‘powerful’ activities.

20
Q

What is the purpose of encryption?

A

Encryption enhances the security of a message or file by scrambling the content, therefore making it unreadable to anyone who intercepts it.

21
Q

What is a computer virus?

A

A piece of code written with intent to steal data or harm computer networks/systems that has the capability of copying itself and transmitting itself to other devices.

22
Q

What is a trojan?

A

A trojan malware is a piece of code written with malicious intent that is created to deceive users of it’s actual purpose.

23
Q

What is spyware?

A

Software that enables an attacker to obtain covert information about another’s computer activities by transmitting data covertly.

24
Q

What is adware?

A

Software that generates revenue for it’s developers by showing unwanted advertisments on a user’s computer screen

25
Q

What are biometric measures?

A

Biometrics are biological measurements unique to each individual person, therefore successfully authenticating a said user.

26
Q

What is a CAPTCHA

A

CAPTCHA forms challenge humans to prove that they are indeed human. This involves recognizing images, that most computers cannot easily do.

27
Q

What is email confirmation?

A

Email confirmation involves sending a user an email to confirm their identity.