Cybersecurity Module Flashcards

You may prefer our related Brainscape-certified flashcards:
1
Q

What is ethical hacking

A

Ethical hacking involves testing security of computer systems, networks, web applications

  • Simulate attacks from malicious hackers
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is role of ethical hacking in network security

A

Identify vulnerabilities from attacker’s POV, so weak points can be fixed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is purpose of ethical hacking

A

Strengthen organisations security measures by identifying & resolving security weaknesses before they can be exploited by attackers

Forsee potential security threats, develop robust security protocols to prevent security breaches

Demonstrate to clients & stakeholders that organisation values data protection, committed to safeguarding information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is penetration testing

A

Deliberately try to exploit security vulnerabilities to see if unauthorised access or other malicious activities are possible

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is black box penetration testing

A

Tester has no prior knowledge of network infrastructure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is grey box penetration testing

A

Tester has partial knowledge of network infrastructure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is white box penetration testing

A

Tester has full knowledge of network infrastructure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is process of penetration testing

A

1) Planning, Obtaining Info

2) Scanning, Gaining Access

3) Maintaining Access, Analysing Risk

4) Reporting Findings

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are properties of ethical hacking

A

Authorisation: Performed with permission under contract

Purpose: Intend to improve system security

Reporting: Results privately reported to organisation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are properties of unethical hacking

A

No Authorisation: Performed Without permission, violates legal boundaries

Malicious Interest: Aims to steal, damage, disrupt operations

Misuse of Data: Exploit vulnerabilities, lead to theft, leaks, data damage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is role of privacy act 1988

A

Regulates handling of personal information about individuals

Protects personal information handled by federal government agencies, certain private sector organisations

All Australian & Norfolk Island government agencies, private sector & not-for-profit organisations (> $3 million), all private health providers, small businesses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is APP 1

A

Open and Transparent Management of Personal Information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is concept of australian privacy principles

A

13 principles, outlines standards/rights/obligations for handling/accessing/correction of personal info

Provide the base framework for how personal data must be treated

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is APP 6

A

Use of Disclosure of Personal Information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is APP 11

A

Security of Personal Information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is authentication

A

Verify identity of users trying to access network resources

Authentication usually requires something the user knows (Password / Security Token / Biometrics)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is characteristics of strong passwords in authentication

A

12-16 characters

Upper & Lower case, numbers, symbols

Avoid common words, phrases, easily guessable info

Different passwords every website

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is organisational approach to password policies in authentication

A

Change password every 3-6 months

Teach employees about importance

Use controls to ensure compliance with password policies

Regular checks ensure policies are followed & effective

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is password policies impact on data security in authentication

A

Strong policies minimise risk of data breaches

Encourage users to take responsibility for own security

Meet requirements for data protection

19
Q

What is 2-factor authentication in authentication

A

Additional security layer, requires 2 forms of identification

Something you know, something you have

Reduces risk of unauthorised access

20
Q

What is biometrics in authentication

A

Fingerprints, Face ID, Voice Recognition

Difficult to forge, high level of security

Potential errors in recognition systems

21
Q

What is purpose of encryption

A

Protect data privacy

Ensure safe data transfer over internet

Data remains original & unaltered

Organisations comply with legal requirements

22
Q

What is public key encryption

A

Public key to encrypt data, private key to decrypt it

23
Q

What are features of public key encryption

A

Non-Symmetric: Public & Private key aren’t the same

Distribution: Public key can be shared, private key kept secret

Use Cases: Securing emails, authenticate digital signatures, establish secure connection

24
Q

What is private key encryption

A

Same key for encryption & decryption

25
Q

What are features of private key encryption

A

Symmetric: Public & Private key the same

Key Distribution Problem: Key shared securely between communicating parties

Encrypt large amounts of data efficiently

26
Q

What is social engineering (phishing) as methods to compromise security of system

A

Trick individuals to revealing confidential information

Phishing - Sending fraud emails/messages, appear to be from trusted sources

27
Q

What is denial of service as methods to compromise security of system

A

Overload system resources, make it unavailable to users

DDoS - Multiple systems attacking single target, amplify attack’s impact

28
Q

What is back door as methods to compromise security of system

A

Pathway into system, bypass normal authentication methods

Intentionally created by developers, installed through malware

29
Q

What is IP spoofing as methods to compromise security of system

A

Attacker sends message to computer with forged IP address

Pretends to be trusted host to gain unauthorised access to information/services

30
Q

What is SQL injection as methods to compromise security of system

A

Exploits vulnerabilities in database layer of application

Attackers execute malicious SQL commands

31
Q

What is man-in-the-middle attack as methods to compromise security of system

A

Attacker intercepts communications between two parties, modify data being exchanged

Impersonate one/both parties

Occur in unsecured Wi-Fi networks or compromised security certificates

32
Q

What is cross-site scripting as methods to compromise security of system

A

Vulnerability in web apps that allows attackers to inject malicious scripts into content viewed by others

Steal cookies, session tokens, other sensitive info

33
Q

What is types of malware as methods to compromise security of system

A

Viruses, worms, trojan horses, ransomware, spyware, adware

Software designed to harm/exploit any programmable device or network

34
Q

What is physical network threats as methods to compromise security of system

A

Physical damage to network infrastructure disrupts services

Physical access to network = Data theft, hardware tampering

  • Theft of devices containing sensitive data
35
Q

What is zero-day vulnerabilities as methods to compromise security of system

A

Flaws in software unknown to vendor, without patch

Valuable to attackers, can be exploited

Requires vigilance, prompt software updates to mitigate risks

36
Q

What is cryptography

A

Securing communication of data through encryption, unreadable to unauthorised users

37
Q

What is purpose of cryptography

A

Ensures confidentiality, integrity, authenticity, non-repudiation of information & communications

Used in banking, secure communications, password protection

38
Q

What is plain text

A

Original message / data that is readable, understandable without any decoding

39
Q

What is cipher text

A

Encrypted version of plain text, produced through cryptographic algorithms

Appears random, cannot be understood without correct decryption key

40
Q

What is substitution as common ciphers

A

Replace elements of plain text with other characters, symbols, groups of characters

41
Q

What is rotation cipher as substitution

A

Shifts alphabet by fixed number

42
Q

What is random substitution cipher as substitution

A

Each letter of alphabet randomly linked to different letter or symbol

43
Q

What is polyalphabetic cipher as substitution

A

Uses keyword to determine shift for each letter of plaintext

Every letter in keyword is the number of shifts of corresponding letter in plaintext

44
Q

What is brute force attack as methods for cracking substitution ciphers

A

Try every possible key until correct one found

Impractical for ciphers with large number of possible keys

45
Q

What is frequency analysis as methods for cracking substitution ciphers

A

Analyse frequency of letters/groups of letters in ciphertext

Compare to typical letter frequencies in language of original message