Cybersecurity Flashcards

1
Q

What does cyber security consist of?

A

It consists of the processes, practices, and technologies designed to protect networks, computers, programs, and data from attack, damage, or unauthorised access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Who commits cyber crime and why?

A

• Criminals who want data to sell to fund organised crime. • Scout kiddies who don’t have an understanding of the technology, just copy someone else. • State operators - espionage. • Blackmailers who hold data to ransom, e.g., by hacking into a business’s infrastructure and encrypting all their files. • Hacktivists - individuals who use cyber crime to gain unauthorised access to organisations and cripple them for moral reasons, e.g., Wikileaks, Anonymous

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is cyber crime?

A

Any illegal activity carried out using computers or the internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are some cyber security threats/liabilities?

A

• Social engineering techniques (Phishing, Shouldering, Blagging) • Pharming • Weak and default passwords • Removable media • Misconfigured Access rights • Unpatched or out-of-date software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is social engineering?

A

Using psychological approaches to manipulate an individual into giving away confidential and personal information, e.g., phishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is phishing?

A

Emails or texts designed to steal personal information to gain access to your money

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is pharming?

A

Redirecting a website’s traffic to another fake website to harvest personal details

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

How does pharming work?

A
  1. An attacker installs software on the victim’s computer or hijacks their DNS server. 2. When the user navigates to a website, the attacker intercepts this and secretly sends their browser to a fake copy of the website. 3. The attacker then steals credentials/payment details
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are the differences between phishing and pharming?

A

Pharming forces the user’s computer to go to the hacker’s website, whereas phishing makes the user themselves navigate to the hacker’s website. Pharming involves downloading software, not just files, and makes the victim’s computer run the malware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is blagging?

A

When an attacker creates a scenario to convince you to hand over data or money. They can convince the victim by using real open-source information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is shouldering?

A

An attacker watching a victim over their shoulder as they enter passwords or personal information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is malware short for?

A

Malicious Software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is malware?

A

Malware is an umbrella term used to refer to a variety of forms of hostile or intrusive software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are some types of malware?

A

Virus, Trojan, Worm, Spyware, Bots, Ransomware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is a computer virus?

A

Software that replicates itself and transfers from one computer to another. It can make unauthorised and undesirable changes to a computer system when it is installed and executed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is adware?

A

Software that either causes pop-ups or windows that will not close. Generally, the pop-ups or windows display advertisements

17
Q

What is a Trojan?

A

Malware that gains access to a computer by pretending to be legitimate software

18
Q

What is spyware?

A

Spyware, when executed, can log activity on your computer and control your webcam and microphone

19
Q

What is a worm?

A

They spread themselves by attaching themselves to network tools. Unlike viruses, they do not require human intervention

20
Q

What is ransomware?

A

A form of malware that encrypts all data on the hard drive of the computer. Once encrypted, the attacker then offers to decrypt the data upon payment—often in cryptocurrency

21
Q

What are some malware defence techniques?

A

• Antivirus • Software updates • Make backups - have at least 2 copies • Captcha

22
Q

How does an antivirus work?

A

Uses signature-based checking to detect already known malware and uses behavioural analysis to detect unknown/new malware

23
Q

What is good practice for backups?

A

• Make at least 2 copies • Make sure it is protected by good physical security and encryption • Cloud backup is generally safer against ransomware attacks

24
Q

What is a captcha?

A

They are used to determine if a user is a real human or a bot. It works by displaying text in a way that is indecipherable to a computer and asking users to type the displayed text

25
What are some common security measures?
• Biometrics • Passwords • Captchas • 2FA • Backups
26
Why is removable media dangerous?
Removable media can allow malware to spread and avoid primary defences. It allows bypassing of internet filtering or firewalls
27
Why should default passwords not be used?
They can be found on the internet or in device manuals
28
What is penetration testing?
The process of testing how an organisation would react to a cyber attack
29
What are the goals of pen testing?
• Gather information about the targets of possible attacks and methods of entry • Attempt to break into the systems (digitally or physically) • Report findings and assist with patching holes in defence
30
What are the two types of attack?
Malicious Insider: Access to internal information. Designed to simulate an attack from within. External attack.