Fundamentals of Cyber Security Flashcards

You may prefer our related Brainscape-certified flashcards:
1
Q

What are the three main threats to a computer system?

A

the three main threats to a computer system are…

social engineering, malicious code and human error.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

what are the four social engineering techniques?

A

The four social engineering techniques are blagging, phishing, pharming and shouldering.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

what is blagging?

A

Blagging is when someone makes up a story to gain another persons interests and encourage them to give away personal information or money.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

what is phishing?

A

Phishing is similar to Blagging but the story is sent through an email that is disguised as a company and is usually believable.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What can be done to notice a phishing email?

A

The email in question will possibly have spelling errors or links that don’t link to the business they’re claiming to be.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

what is pharming?

A

The process of a link redirecting the user from a genuine site to a fake one. the fake website will often look similar to the genuine one hence when the person tries to log in their information will be sent to the someone who will use the info to access the users accounts.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is shouldering?

A

The process of which a thief will look over someones shoulder and look at someones personal information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Name two ways shouldering can be reduced in effectiveness?

A

One way is that someone will cover their pin with their hand so that the thief will not be able to gather any important information. another way that shouldering can be stopped is by software that doesn’t display the pin on the screen but instead displays an asterisk.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

name one malicious code software?

A
you could have named...
viruses 
Trojans 
Ransomware 
Spyware 
Adware
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

what is a virus?

A

a virus id a piece of software that infects the computer and then replicates itself to be passed onto another computer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

what are Trojans?

A

Trojans are programs or files that seem harmless but have malicious code hidden inside. This will only appear once the program is installed or the file is opened.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is ransomware?

A

Ransomware is a program that hijacks the data on a computer by encrypting it and demands that the owner pays money to have it decrypted.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

what is spyware?

A

spyware is a type of malware that collects the users activity on a computer system and sends it to another person without the user being aware.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

what is adware?

A

adware is software that either causes pop-ups or windows that will not close. generally the pop-ups or windows displayed will hold advertisements.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are the rules to follow to make it harder for a computer to crack a password?

A

1) Have a 6 or more character password
2) Include upper and lower case letters
3) Include numbers and symbols
4) Avoid using information that may be easy
to guess such as names or birthdays.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

what is misconfigured access rights?

A

Access rights set up what can and cannot be seen when a user logs into a system. If these aren’t set up correctly on an email server then the user may be able to see to see others emails.