CyberSecurity Flashcards
What techniques can you use to create a strong password?
Various methods like using a combination of uppercase and lowercase letters, numbers, and special characters - not too short; avoiding common words or phrases; and using a passphrase.
Besides passwords, what are other ways to secure data or accounts?
Two-factor authentication (2FA), biometric authentication (e.g., fingerprint or facial recognition), encryption, regular data backups, and secure networking protocols.
What are the differences between white hat, grey hat, and black hat hackers?
White hat hackers are ethical hackers who use their skills to help organizations by finding vulnerabilities before malicious hackers do. Grey hat hackers sometimes break the law but don’t have malicious intent. Black hat hackers engage in illegal activities for personal gain or to cause harm.
How might hackers break the Computer Misuse Act?
By gaining unauthorized access to computer systems, distributing malware or viruses, or engaging in activities that disrupt or damage computer systems or data without permission.
How can you edit file extensions to disguise files?
By changing the file extension to a different file format, making it appear as a harmless file type while actually being a different, potentially malicious, type.
How can you find information about an image by running a reverse Google search?
By uploading the image to Google Images or using the “Search by image” feature to find websites where the image appears and retrieve related information.
What can you learn by investigating file properties?
File properties can provide details such as the file’s creation date, last modified date, file type, size, and sometimes metadata about the file.
What information can you find in the EXIF data of images?
EXIF data can include details such as the camera model, shutter speed, aperture, ISO sensitivity, GPS coordinates, and timestamps of when the photo was taken.
How can steganography be used to find and hide data in files?
Steganography involves concealing data within another file, such as embedding text within an image or hiding files within seemingly innocuous files like audio or video files.
How can keys be used to decipher data?
Keys are used in encryption algorithms to encode and decode data. The same key used to encrypt data is needed to decrypt it, ensuring that only authorized parties can access the information.
Why are OS updates and software patches important?
OS updates and software patches often contain fixes for security vulnerabilities, ensuring that systems are protected against known threats and vulnerabilities.
What is the role of antivirus software in cybersecurity?
Antivirus software helps detect, prevent, and remove malware infections on computer systems by scanning files and monitoring system activity for suspicious behaviour.