Fundamentals of Cyber Security Flashcards

1
Q

Define the term social engineering.

A

The art of manipulating people so they divulge personal information such as passwords to bank account details.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Explain the term blagging.

A

Blagging is the act of creating and using an invented scenario to engage a targeted victim in a manner that increases the chance the victim will divulge information or perform actions that would be unlikely in ordinary circumstances.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Explain the term phishing.

A

A technique of fraudulently obtaining private information, often using email or SMS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Explain the term pharming.

A

A cyber attack intended to redirect a website’s traffic to another, fake site.

  • The attacker will put code code on your hard drive or on the actual server itself.
  • When you type in a genuine website address, pharming redirects you to a fake/bogus website and you will be asked to give personal info.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Explain the term shouldering.

A

Observing a person’s private information over their shoulder eg cashpoint machine PIN numbers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Define the term ‘malware’.

A

The term used to refer to a variety of forms of hostile or intrusive software.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Describe how malware can be protected against.

A

Anti-malware software:
Prevents harmful programs from being installed on the computer.
Prevents important files, such as OS, from being changed or deleted.
If a virus does install itself, the software will detect it whilst performing regular scans - any virus detected will be scanned.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Describe the term computer virus.

A

A program that is installed on your computer without your knowledge or permission with the purpose of doing harm.
- Includes instructions to replicate automatically on a computer and between computers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Describe the term trojan.

A

A program which appears to have one legitimate purpose but actually has another - normally spread by emails.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Describe the term spyware.

A

Software that gathers information about a person or organisation without their knowledge. Often used to track and store users’ movements on the internet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Describe the term adware.

A

Analyses which internet sites a user visits and then presents adverts for products which the user may be interested in.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Explain biometric measures as a security measure.

A

Biometric measures are used to identify people to prove to the system that they are who they claim to be - this includes fingerprint scan, voice pattern sample or retinal scan.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Explain CAPTCHA (or similar) as a security measure.

A

Completely Automated Public Turing test to tell Computer and Humans Apart, is a type of test to determine whether or not the user is human.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Explain using email confirmations to confirm a user’s identity as a security measure.

A

Email confirmations may be sent when you sign up to a new web service. You will not be registered until you click on the link to finish off the registration process and activate the account.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Explain automatic software updates as a security measure.

A

Browsers, pdf readers, and other software can be automatically updated by selecting options to automatically update and install either from the OS or from the software.
- This will remove any harmful code that has been planted in the software by the hacker, or potential vulnerabilities that could be exploited in the future.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly