Cybersecurity Flashcards

1
Q

How can cybersecurity be defined?

A

A series of processes, practices, and technologies that protect networks, computers, software and data from damage, loss and unauthorised access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is social engineering?

A

A form of cyberattack that focuses on people as a weak point in a system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Describe phishing.

A

Using emails to lure people to fake, convincing webpages. The details entered are transmitted elsewhere, to another person.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Describe pharming.

A

Redirecting users to an unsafe, convincing website that collects a user’s login credentials.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Describe shouldering.

A

watching over someone’s shoulder as they enter a password, or classified information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Describe pretexting/blagging.

A

fabricating a scenario, to gain unauthorised access to a system (e.g. pretending to be IT support to get an employees password.)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is malware?

A

Any program that works against the interests of you and your computer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Describe viruses.

A

self replicating pieces of code that can damage data and software. They often spread via email attachments of USB drives.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Describe Trojans.

A

legitimate programs developed with the intention of hiding malicious code within.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Describe spyware.

A

it covertly obtains sensitive data and transmits it to he hacker.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Describe adware.

A

It downloads unwanted internet adverts, observing someone’s online behaviour to target specific adverts.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are the threats associated with weak passwords?

A

They are easy to guess, which can lead to someone being able to access sensitive information. Strong passwords have a mix of upper and lower case, symbols and numbers. Default passwords can also be problematic, as it makes you more vulnerable.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are the threats associated with misconfigured access rights?

A

Access rights are rules that tell a computer system which user should have access to which files and resources. If not set up properly, some people could have access to sensitive information, unauthorised.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are the threats associated with removable media?

A

Any storage device that is portable can be used to steal data or introduce malware onto a system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are the threats associated with unpatched systems?

A

When a security risk is identified in a program, developers reach a patch, an add on program which could fix the risk. Not patching up leaves you vulnerable.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Explain penetration testing.

A

This is the use of a contractor or employee to hack into a system, to identify security risks and weaknesses, so they can be resolved

17
Q

Explain biometric measures.

A

They make account and details access more secure.

18
Q

Explain password systems.

A

Automatic procedures which ensure sound policies are followed (only strong password are accepted, and must be changed on a regular basis).

19
Q

Explain CAPTCHA.

A

This is a test - blurry text is presented to a reader, which is easy for humans to read. It ensures it isn’t a program trying to guess at a rate of millions of attempts per second.

20
Q

Explain email confirmation.

A

When a password is changed, a user must verify their change by clicking on a link from an email on their registered email address, ensuring it is a person who should have access.

21
Q

Explain automatic software updates.

A

New versions of software, which could have updated security measures, are automatically downloaded, to decrease vulnerability.