Fundamentals Of Cyber Security Flashcards

You may prefer our related Brainscape-certified flashcards:
1
Q

Cyber security

A

Processes, practices and technologies designed to protect networks, computers, programs and data from attacks and damage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Social engineering

A

Art of manipulation of people to achieve confidential informations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Blagging

A

Actor creating a false scenario to make the target to give his confidential data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Phishing

A

Using email or sms

Spam or ads that are fake

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Pharming

A

Cyberattacks intended to redirect the websites traffic to a fake one

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Shouldering

A

Looking over someone’s shoulder when they input important data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Malicious code/Malware

A

Hostile or intrusive software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Computer virus

A

Infect other programs

  • money making
  • vandalism
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Trojan

A

Malicious code that pretend to be something else

Create a back door for the owner to steal information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Spyware

A

Software that gains info about the user without their knowledge

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Adware

A

Display ads through web pages on applications that generate money

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Biometric measures

A

Fingerprint
Face recognitions
DNA analysis
Palm print

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Password system

A

Form of verification

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

CAPTCHA

A

A program that is supposed to distinguish human uses from a bot uses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Email confirmation

A

Ensure that the user is both human and owner of the particular email address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Automatic software

A

Way to combat attacks on computers that exploit weaknesses

17
Q

Penetration Test

A

Attempt by an authorised team to crack a network of go through security checks to give information about what could be improved

18
Q

White-box penetration

A

Crackers have insider knowledge of the system

Explore how secure an organisation is against malicious code

19
Q

Black-box penetration

A

Simulation of a external hack on an organisation to test their security