Cybersecurity Flashcards
What are ethical/white-hat hackers?
Ethical or white-hat hackers are paid to try and break into networks or databases to identify any security flaws.
For example, the police would have white-hat hackers to catch black-hat hackers or other types of cyber criminal.
What are the most commonly stolen forms of data?
Name
Address
Email address
Phone number
Passwords
What can hackers do with your name and address?
Hackers could apply for loans and credit cards in your name or use this information to transfer money illegally.
What can hackers do with your email address?
You’ll be sent spam and other forms of unwanted marketing emails
You may be the target of phishing attacks.
What can happen if a scammer gets hold of your phone number?
You’ll likely be receiving a variety of annoying calls from fake insurance companies, banks or even the government to try and convince you that you owe a large sum of money.
What can happen if a hacker gets hold of your password?
They can access your accounts e.g banking, shopping, email or social media.
As well as using your identity to access your accounts and funds, a scammer might also use it to cloak themselves and commit other cyber crimes pretending to be you and making it harder to track the source of the attack back to them.
What passwords are the hardest to crack?
The longest passwords are the safest.
What are the advantages of fingerprint scanners?
Unique to everyone
Hard to fake
Change very little over the course of your life
What are the disadvantages of fingerprint scanners?
Someone could steal your biometrics.
If you hurt your finger, it won’t recognise it.
System failures may block access
What are the disadvantages to the face scanner?
Not perfect
Some people may have similar faces.
If you get cosmetic surgery, it won’t recognise you
Poor camera quality may hinder its ability to recognise you
What are the advantages of facial scanners?
You can unlock your smartphone with a glance
Completely contact-free
Makes it easier to track down thieves or criminals
What are the advantages to voice recognition?
Time-saving
Easy to use
Non-contact
What are the disadvantages to voice recognition?
Voices can change overtime
Not always accurate if someone has a similar voice
High false negative rate and false positive rate
What is 2FA?
2FA is requires you to log in using a username and password but then to use an additional method to prove that you are a genuine user.
What are examples of 2FA?
• Texting a code to your mobile phone that you need to complete the login process
• Emailing a link that you must click on to complete the login process
• Asking for a code from an app like Google Authenticator to complete the login process