cybersecurity Flashcards

1
Q

define cybersecurity

A

the process or practices of protecting , systems, networks and programs from digital attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

define network security

A

Any activity designed to protect the usability and integrity of a network and its data by managing access to the network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

what is social engineering

A

Social engineering is a set of methods used by cybercriminals to deceive individuals into handing over information that they can use for fraudulent purposes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

what is blagging

A

Blagging (also known as pretexting) is an attack where the perpetrator invents a scenario in order to convince the victim to give them data or money.
It often requires the attacker to maintain a conversation with the victim until they are persuaded to give up whatever the attacker asked for.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

what is phishing ?

A

Phishing isthe practice of sending fraudulent communications that appear to come from a legitimate and reputable source, usually through email and text messaging. The attacker’s goal is to steal money, gain access to sensitive data and login information, or to install malware on the victim’s device.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

what is shouldering

A

Shouldering is observing a person’s private information over their shoulder eg cashpoint machine PIN numbers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

what is pharming

A

Pharming is a cyber attack intended to redirect a website’s traffic to a fake website.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

what is malware

A

Malware (malicious software) is software that is designed to gain access to your computer with malicious intent.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

what is a computer virus

A

Viruses are a malicious form of self-replicating software.

Once on a computer or network, a virus will replicate itself by maliciously modifying other computer programs and inserting code.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

what is a trojan

A

A trojan is a piece of software that appears to perform a useful function (such as a game). However, unbeknown to the user, it also performs malicious actions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

what is a worm

A

Worms replicate themselves, but do not attach themselves to files like viruses.

Instead, worms spread through the network and use the system’s resources.

Most worms cause problems by using up network bandwidth and therefore slowing down the network significantly.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

what is spyware

A

Spyware is unwanted software that monitors and gathers information on a person and how they use their computer.

This can include monitoring your internet usage to send you harmless but annoying adverts.

More sinister spyware will include keyloggers that record every keystroke made by a user.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

what is ransomware

A

Specifically, ransomware locks a computer, encrypts files, and therefore prevents the user from being able to access the data.

The attacker will demand that a ransom be paid before they decrypt the files and unlock the computer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

what is adware

A

Adware refers to software that has advertisements embedded in the application. It is not always a bad thing and is considered a legitimate alternative that can be offered to consumers who do not wish to pay for software.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

what is encryption

A

Encryption is the process of encoding data or a message so that it cannot be understood by anyone other than its intended recipient.

The data or message is encrypted using an encryption algorithm. The opposite of encryption is decryption.

Encrypted data is called cipher text and unencrypted data is plain text

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

what is symetric encryption and asymetric encryption

A

Symmetric encryption uses just one key to hide and read a message.

Both parties must know the key.

If that key becomes public, all messages can be read.

Asymmetric encryption has a public key and a private key.

The public key can be used to encrypt but CAN’T decrypt the data

Only the private key can decrypt the data

17
Q

what are features of a good password

A

At least eight characters

Includes upper case characters

Includes lower case characters

Includes special characters

Includes numbers

Three random words combined

Relates to an acronym

Does not include a name, company name, or username

18
Q

what is a data breach

A

A data breach is a security incident in which sensitive, protected, or confidential data is copied, transmitted, viewed, stolen, or used by an individual who is not authorised to do so. It is also known as data interception.

19
Q

what is a denial of service attack

A

This is a cyberattack in which the criminal makes a network resource unavailable to its intended users.

This is done by flooding the targeted machine or website with lots of requests in an attempt to overload the system.

20
Q

what is a brute force attack

A

This is a form of attack that makes multiple attempts to discover something (such as a password).

21
Q

what is a firewall

A

A firewall sits between a local network or computer and another network to control the incoming and outgoing network traffic.

The firewall’s rules determine which traffic is and is not allowed through the network.

A firewall blocks unexpected connections coming into the network. Most operating systems include a firewall.

22
Q

what is a network policy

A

Network policy is a set of digital rules that govern what is and is not authorised on the network.

A firewall will have a set of rules that it follows to help it determine what traffic to authorise.

23
Q

what is anti-malware

A

Anti-malware is software that scans any file that is able to execute code.

The anti-malware will have a list of definitions of sequences of code that they are aware are malicious.

If the code in your files matches the definitions, the files are quarantined.

24
Q

what is a disaster recover policy

A

A disaster recovery policy is a plan to recover your network and IT infrastructure following a major incident such as

Natural disaster (earthquake)

Cyberattack

Fire or flood

Terrorism or war

Loss of electricity or electrical surge

25
Q

what is mac adress filtering

A

MAC address filtering

A device’s media access control (MAC) address is unique, the network manager makes a more secure network by using this address to limit the devices on the network.

26
Q

what is penetration testing

A

Penetration testing is a type of security testing that is used to test for insecure areas of a system or application.

Penetration testing is the process of attempting to gain access to resources without knowledge of usernames, passwords and other normal means of access.

27
Q

what are biometric checks

A

term for body measurements and calculations
(fingerprints and retinal scans, facial recognition).

28
Q

what is CAPTCHA

A

used to determine if a user is a machine or not

29
Q

what is the importance of automatic software updates.

A

makes sure a product is kept up to date and security flaws are fixed as soon as possible without need for manual intervention

30
Q

what are the types of penetration testing

A

when the person or team testing the system has knowledge of and possibly basic credentials for the target system, simulating an attack from inside the system (a malicious insider)

when the person or team testing the system has no knowledge of any credentials for the target system, simulating an attack from outside the system (an external attack).

31
Q

what is sql injection

A

SQL injection occurs when malicious SQL statements are inserted into an entry field for execution.