Cybersecurity Flashcards

1
Q

What are the main threats to cybersecurity?

A
  • Malware
  • Viruses
  • Worms
  • Keyloggers
  • Trojans
  • Spyware
  • Hacking
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What does malware do and how do we prevent it?

A

A piece of software made to disrupt or damage a computer system.

Prevention- Install antivirus software on a file server to scan all files regularly for possible infection,

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What does a virus do and how do we prevent it?

What is the difference between a worm and a virus?

A

A type of malware that is installed without the users knowledge (usually via email) and will repeatedly copy and embed itself in programs and data files to infect and corrupt them.
Worms work independently without human action where viruses need human assistance.

Prevention- Install an antivirus on email servers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What does a key logger do and how do we prevent it?

A

A program that copies and stores all keystrokes for fraudulent access to passwords and confidential information.

Prevention- Using a Bluetooth keyboard that encrypts strokes and prevents the installation of device drivers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What does a trojan do and how do we prevent it?

A

Software that breaches access by disguising itself as a harmless software and will access user’s data (e.g. banking details)
Prevention- Encrypt all sensitive data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What does spyware do and how do we prevent it?

A

Software that accesses and transmits data from another computer’s hard drive
Prevention- Using encryption keys that allow access only to authorised users and placing a firewall on servers to check/block network traffic.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What does hacking do and how do we prevent it?

A

When a user gains unauthorised access to a computer system.

Prevention- Set up firewalls on network servers and encrypt important data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are the 5 types of technical weaknesses?

A
SQL Injection 
DoS (Denial of Service) Attack 
IP Address spoofing 
Social Engineering 
Phishing
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is SQL injection?

A

When a hacker uses SQL (Structure Query Language) code to gain access to a data base and steal valuable information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is a DoS Attack?

A

When a network/ website is flooded with data traffic to bring it to a halt. (Usually asking for a ransom to boot the network/ website back up)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is IP Address Spoofing?

A

When a hacker changes the IP address of a site so that visitors are taken to a fraudulent web page.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is social Engineering?

A

When cyber criminals personally manipulate/trick employees into giving them access to a network by pretending to be a contact of their company

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is Phishing?

A

When an attacker uses emails or text messages to impersonate an organisation and trick employees into give them confidential data which allows them to access accounts/ networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is the difference between foot printing, ethical hacking and penetration testing?

A

Foot printing

  • When a penetration tester determines how much detail a potential hacker could find out ABOUT THE SYSTEM
  • This allows an organisation to limit the technical information about a system that is publicly available

Ethical Hacking

  • Is carried out with the permission of the system owner to cover all computer attack techniques
  • They attempt to bypass system security and search for any weak points that could be exploited by a hacker.
  • They know how to reinforce the security.

Penetration testing

  • A broader penetration test carried out by the companies IT team
  • It can be carried out automatically
  • External (Hacker getting in) and Internal (Malicious employee) testing
How well did you know this?
1
Not at all
2
3
4
5
Perfectly