ICT Flashcards

1
Q

Malware

A

Malware is any software intentionally designed to cause damage to a computer, server, client, or computer network.

Preventive strategies include installing and regularly updating antivirus software, and avoiding clicking on suspicious links.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
1
Q

Password Theft

A

Password theft refers to the unauthorized access to and use of someone’s password, leading to identity theft and data breach.

Preventive strategies include using strong, unique passwords, regularly updating them, and enabling two-factor authentication.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Traffic Interception

A

Traffic interception, also known as eavesdropping or sniffing, is the process of intercepting and potentially altering the communication between two parties without their knowledge.

Preventive strategies include the use of VPNs and encrypting data before transmission.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Phishing Attacks

A

Phishing attacks are attempts to obtain sensitive information such as usernames, passwords, and credit card details by disguising oneself as a trustworthy entity in an electronic communication.

Preventive strategies include employee education and awareness training, and the use of email filtering software.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Distributed Denial of Service (DDoS) Attacks

A

DDOS is an attempt to make an online service unavailable by overwhelming it with traffic from multiple sources.

Preventive strategies include the use of DDoS protection services and overprovisioning bandwidth.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Cross Site Scripting (XSS)

A

Also known as Cross-Site Scripting, XSS is a type of injection where malicious scripts are injected into trusted websites.

Preventive strategies include the use of web application firewalls, regularly updating and patching systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

SQL Injection

A

SQL Injection is a code injection technique that might destroy your database. It is one of the most common web hacking techniques.

Preventive strategies include the use of prepared statements with parameterized queries, regular code review, and penetration testing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Ransomware

A

Ransomware is malicious software designed to block access to a computer system until a sum of money is paid.

Preventive strategies include regular and secure backups of important data, and employee training and awareness.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Cryptojacking

A

Cryptojacking is the unauthorized use of someone else’s computer to mine cryptocurrency.

Preventive strategies include the use of network monitoring tools, and regular system checks and updates.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Trojan Virus

A

A Trojan virus is a malicious program that performs actions not authorized by the user, such as modifying, blocking, or deleting data.

Preventive strategies include the use of robust antivirus software and avoiding downloading files or clicking on links from unknown sources.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Common Cybersecurity Strategies [7]

A
  • Risk Assessment: Identify potential risks to ensure information security.
  • Implementing Security Measures: Utilize antivirus, data encryption, secure routers, and other tools designed to protect against threats.
  • Regular Updates and Patches: Keep all systems, software, and hardware up to date to protect against new threats.
  • Access Controls: Implement strong user authentication and access control to ensure only authorized individuals can access sensitive data.
  • Training and Awareness: Regularly train staff on safe online practices and how to identify security threats such as phishing emails.
  • Cyber-Audits and Testing: Conduct regular audits and penetration testing to find potential weaknesses before they can be exploited.
  • Disaster Recovery Plan: Have a plan in place to respond quickly in the event of a breach to minimize damage.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Types of Data Analytics for auditing [4]

A
  • Predictive Analytics: Forecast future trends based on historical data.
  • Prescriptive Analytics: Suggest actions to benefit from predictions.
  • Diagnostic Analytics: Investigate past performance to determine cause.
  • Descriptive Analytics: Use data aggregation and mining to provide insight into the past.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Disadvantages of Data Analytics in Auditing [4]

A
  • Data Quality: Reliability depends on the accuracy of the data.
  • Over-reliance on Data Analytics: May lead to neglect of professional judgment.
  • Data Privacy and Security: Handling large volumes of sensitive data raises concerns.
  • Cost: Investment in technology and training can be significant.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Use of ICT by Auditor [4]

A
  • Meetings: Utilize teleconference facilities, including audio, video, and data sharing.
  • Audit of Documents: Remote access to documents and records.
  • Recording Information: Use still video, video, or audio recordings for evidence.
  • Remote Access: Provide visual/audio access to remote or hazardous locations.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Benefits of Using ICT [4]

A
  • Remote Auditing: Allows auditing from a distance.
  • Data Analysis: Facilitates thorough analysis of data.
  • Real-Time Monitoring: Enables monitoring of systems as they operate.
  • Documentation: Assists in preparing and storing documents efficiently.
  • Cost Reduction: Saves on travel and third-party expenses.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Limitations of Using ICT [4]

A
  • Dependence on Technology: Reliance on ICT can be a vulnerability.
  • Security and Privacy Concerns: Handling sensitive data requires robust protection.
  • Cost: Initial investment in technology can be high.
  • Training and Skill Requirements: Staff need training to use ICT effectively.
  • Data Overload: Managing large volumes of data can be challenging.