Cybersecurity Flashcards

1
Q

Network

security

A

The range of measures that can
be taken to protect network
data from accidental or
malicious damage.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Encryption

A
Conversion of data, using an
algorithm, into cyphertext
that cannot be understood by
people without the decryption
key.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Compression

A

The process of reducing file
size to allow more data to be
stored on the disk and increase
transfer speeds.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Backup

A

A copy of data that can be used

if the original data is lost.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Archiving

A

The process of storing data that
is not in current use for security,
legal or historical reasons.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Cybersecurity

A

The range of measures that can
be taken to protect computer
systems from cyberattack.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Cyberattack

A
An attempt to expose, alter,
disable, destroy, steal or gain
unauthorized access to data on
a computer system or smart
device.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Malware

A

MALicious softWARE; the term
used for any kind of computer
software written to enable a
cyberattack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Vulnerabilities

A

Software security flaws or holes
that are fixed via the release of
patches

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Cookies

A

Data downloaded from a
website that allows the website
to identify the computer in
future.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

SQL Injection

A

Injected SQL commands can alter SQL
statements and compromise the security of
information held in a database.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Denial of

Service (DoS)

A

Making a website and servers unavailable to
legitimate users, by swamping a system with
fake requests.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Password

attacks

A

Brute force or dictionary attacks to discover

passwords

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

SQL Injection

A

Injected SQL commands can alter SQL
statements and compromise the security of
information held in a database.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

IP Spoofing

A

Changing the IP address of a site so that a
visitor is taken to a fraudulent or spoofed web
page

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Social

engineering

A

Deception such as phishing. Tricking a user

into giving out sensitive information.

17
Q

Protections against malware

A
Install anti-virus software
• Use a firewall
• Keep the operating system up to date
• Use the latest version of browsers
• Look out for phishing emails.
18
Q

Hackers

A

Individuals who will violate computer security for malicious or financial reasons; they may also be known as crackers.

19
Q

Planting the flag

A

Individuals who may seek financial reward for finding vulnerability, but are more interested in finding vulnerabilities than gaining something for themselves.

20
Q

Ethical hackers

A

Individuals whose activities are designed to test and enhance computer security; they may also be known as ethical hackers.

21
Q

Social engineering

A

The psychological manipulation of people into performing actions or divulging confidential information.

22
Q

Pharming

A

Pharming redirects victims to a bogus site even if the victim has typed the correct web address. This type of scam is often applied to the websites of banks or e-commerce sites.

23
Q

Phishing

A

Phishing is the act of trying to obtain confidential records such as passwords. Emails that look as if they are from a legitimate, respected organisation are sent, but they contain links to fake websites that ‘phish’ data from unsuspecting victims.

24
Q

Shoulder surfing

A

Looking over another person’s shoulder to view passwords or other data that is being entered.

25
Q

Malware

A

Short for malicious software, this is programming or code that is used to disrupt computers by:
● Gathering sensitive information
● Gaining access to private computer systems
● Displaying unwanted advertising
● Distributing the performance of a computer or network

26
Q

Brute force attack

A

This type of attack can occur when an attacker systematically submits guessed passwords with the hope of eventually guessing correctly.

27
Q

DoS

A

A denial of service attack (DoS attack) is a cyberattack in which a criminal makes a network resource unavailable to its intended users by flooding the targeted machine or website with lots of requests in an attempt to overload systems and prevent some or all legitimate requests from being fulfilled.

28
Q

DDoS

A

In a distributed denial of service attack (DDoS attack), the incoming traffic flooding the victim originates from many different sources. This makes it impossible to stop the attack simply by blocking a single source.

29
Q

SQL injection

A

SQL injection occurs when malicious SQL statements are inserted into an entry field for execution (e.g. to dump the database contents to the attacker).

30
Q

Virus

A

Malware that usually embeds itself into existing software on a device and then, once that software is run, spreads to other executable files.

31
Q

Worm

A

While also self-replicating, a worm does not need to infect an existing program. Worms are able to spread very rapidly, infecting large numbers of machines.

32
Q

Ransomware

A

This type of Trojan can modify data on a computer or device so that it doesn’t run correctly or so that users can no longer use specific data. The criminal will only restore the computer’s performance, or unblock data, after the victim has paid them the ransom money they demand.

33
Q

Spyware

A

Programs that can spy on how a user makes use of their computer or device, for example by tracking the data entered via a keyboard, taking screenshots, or getting a list of running applications.

34
Q

Firewall

A

A firewall sits between a local network or computer and another network, controlling the incoming and outgoing network traffic.

35
Q

Penetration testing

A

A type of security testing used to test the insecure areas of a system or application.