Dangerous Data Flashcards

1
Q

Cybersecurity

A

The information, tools, and practises relating to the protection of computers, networks, programs, and data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
1
Q

Hacker

A

A person who illegally accesses computers to cause intentional harm.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

White Hat Hacker

A

A hacker who is employed in order to identify flaws in a computer system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Black Hat Hacker

A

A hacker who acts with malicious intent.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

CIA (Cybersecurity)

A

Confidentiality, Integrity, and Availability - the three principles of information security, suggesting that information should only be read by the intended people, should remain unchanged, and be available when required.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Phishing

A

The process of sending emails or other forms of communication to a user supposedly coming from a company or other legitimate source. This is in order to trick a user in to responding with personal information such as a password or bank account details.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Spear Phishing

A

A type of phishing directed towards people and organisations of interest using pre-known information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Whaling

A

A type of spear phishing directed towards senior management.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Backdoor

A

A gap in a computers security which allows hackers to steal data or control the device. This permits a hacker to log keystrokes, monitor clipboard activity, capture screenshots, and detect security software.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Keystroke Logging

A

The process of recording a series of entered keys in order to obtain information such as passwords or PIN numbers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Clipboard Activity Monitoring

A

The process of recording information on an area of memory known as the ‘clipboard’ which contains copied text and data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

APT (Dangerous Data)

A

Advanced Persistent Threat - a combination of several attacks, such as spear phishing and malware, to expose an organisation for a long period of time.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Hashing

A

The process of transforming a piece of plaintext to a hash using a certain algorithm such as MD5. Every piece of plaintext has a unique hash, with all hashes being of the same length. It is almost impossible to transform a hash back in to plaintext.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Brute Force Attack

A

A method of breaking passwords which means cycling through every possible password.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Dictionary Attack

A

A method of breaking passwords which means trying common passwords stored in a dictionary.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Keylogger Program

A

A program which logs combinations of entered keys.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Password Manager

A

An application for storing passwords for different sites and software.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Two-factor Authentication

A

A requirement by a facility to present two items of information, such as a fingerprint and password, or bank card and PIN.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Hardware Security Token

A

A small item kept in a wallet or on a keychain. The one-time password on it can be used together with a known password to sign in to a bank account online.

19
Q

Malware

A

A term for malicious software.

20
Q

Ransomware

A

A type of malware which asks the user for a financial payment, threatening to destroy or encrypt files if it is not given.

21
Q

Virus

A

A type of malware which can duplicate itself once in a computer. They are attached to specific applications and are activated once the program is run, at which point they send copies to new areas of memory. They consist of three components: the infection mechanism, the trigger, and the payload.

22
Q

Infection Mechanism (Malware)

A

The part of a virus which locates targets by searching through files or for a new device on a network.

23
Q

Trigger (Malware)

A

An event which activates a virus - often a date or action.

24
Q

Payload (Malware)

A

The part of a virus which contains destructive code, used to encrypt data, damage the OS, and other functions.

25
Q

Worm

A

A form of self-duplicating malware that acts as a standalone application. They can spread through network connections to infect other devices and are activated using a trigger.

26
Q

Trojan

A

A form of malware, generally transmitted through emails or pop-up advertisements. It contains a harmful payload which can gain control of a computer, copy personal information, monitor keystrokes, or spread to other devices.

27
Q

Adware

A

A form of malware which forces users to view advertising and can report internet usage.

28
Q

Spyware

A

A form of malware which attempts to access data by monitoring keystrokes or other patterns.

29
Q

Rootkit

A

A hidden malware program which can remotely control a computer.

30
Q

Hijacker

A

A type of malware which can redirect browsers to unintended sites for advertising revenue or to download further malware.

31
Q

Social Engineering

A

The use of psychology to influence a user in to performing actions that compromise security.

32
Q

Zero Days

A

A bug unknown to developers and security systems. They can pose a serious threat to companies and users, especially as they take a long period of time to patch.

33
Q

Botnet

A

A set of infected computers which, together, perform a malicious task over the internet. They can consist of thousands of machines, and can perform tasks including sending spam emails, completing brute-force decryption, mining Bitcoin, initiating a DoS attack, and using click fraud to simulate clicking on an advert.

34
Q

Zombie

A

A term for an infected computer on a botnet.

35
Q

Client-Server Botnet

A

A form of botnet in which machines are controlled by a remote command and control server, sometimes multiple. The zombie contacts the server over the internet using pre-existing channels, and can even receive updates through this.

36
Q

Peer-to-Peer Botnet

A

A modern form of botnet which does not require a central server. Each zombie stores a list of peers which it can exchange information with. Commands and updates begin at a ‘commander’ and are sent through the network as devices communicate. They are difficult to take down as they only require a single commander to be online.

37
Q

DoS Attack

A

Denial-of-Service Attack - a method of damaging a network by flooding connections with data that prevents legitimate traffic.

38
Q

DDos Attack

A

Distributed Denial of Service Attack - a form of DoS attack which consists of thousands of zombies spread out across the internet collaborating on an attack.

39
Q

Antivirus Software

A

A software intended to combat malware. It uses several techniques to do so including signatures and heuristics.

40
Q

Signatures (Malware)

A

A unique pattern of data created by a malware program. It can be detected by antivirus software either passively or whilst performing a disk scan, but signatures have to be known for this to work. Signatures can change if a malware creator chooses to update them, and some modern malware can even change its own signature.

41
Q

Heuristics (Malware)

A

Rules which identify dangerous software based on previous malware experience. They look for code common in malware such as overwriting key OS files. Some heuristics place malware in a simulated computer known as a ‘sandbox’ to study its effect.

42
Q

Sandbox (Malware)

A

A simulated computer used to test the effect of software thought to be malware.

43
Q

PLC

A

Programmable Logic Controller - a machine which allows assembly lines to be updated via magnetic tape cartridges or internet connection. They have long lifetimes, do not consider security concerns, often have default passwords and insecure networks, and work with older models and components.

44
Q

Air Gap

A

A space which prevents data from leaving or entering a facility.

45
Q
A