Cybersecurity Flashcards

You may prefer our related Brainscape-certified flashcards:
1
Q

Malware

A
  • Short for malicious software, malware is a
    broad-spectrum term used to describe
    software used to disrupt computer operation.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Viruses

A
  • A virus is a computer program that is able to
    copy itself onto other programs often with the
    intention of maliciously damaging data. A virus
    is transmitted by ‘piggybacking’ on another
    program known as a ‘vector’.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Worm

A

Is similar to a virus but is a standalone
program that replicates itself in order to spread
to other computers. It does not need a vector.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Key loggers

A

Are covert programs that capture keyboard (or
other input device) input and transmit this data
to a third party or hold the data for collection.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

firewall

A

software or hardware security system that controls the
incoming and outgoing network traffic. Packets of data are analysed to determine whether
they should be allowed through or not.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

protection

A

patching out-dated software
* security tools
* personnel.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

anti-virus software

A

program that can be loaded into
memory when the computer is running.
It monitors activity on a computer
system for the signs of virus infection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

SQL injection

A

malicious users can inject SQL commands into an SQL
statement, via web page input. Injected SQL commands can alter SQL statements and
compromise the security of information held in a database.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Denial of service (DoS) attacks

A

attempt to make your website and servers unavailable to legitimate users, by swamping a
system with fake requests
(single internet connection)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

DDoS

A

launched from multiple
connected devices that are distributed
across the internet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Dictionary attack

A

This uses a simple file containing words found in a
dictionary. This attack uses exactly the kind of words that
many people use as their password

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Brute force attack

A

able to detect
non-dictionary words by working through all possible
alphanumeric combinations from aaa1 to zzz10. It’s not
quick, but it will uncover your password eventually.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Guess

A

A user-generated password is unlikely to be random.
Passwords are likely to be based upon our interests,
hobbies, pet names, family names etc. Educated guesses
often work.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

IP spoofing

A

an attacker changing
the IP address of a legitimate host so that a visitor who types in the URL of a legitimate site
is taken to a fraudulent or spoofed web page

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Social engineering

A

tricking a user
into giving out sensitive information such as a password, by posing as a legitimate system
administrator.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

phishing

A

sending emails or other messages purporting to be from reputable companies in order to induce individuals to reveal personal information, such as passwords and credit card numbers.