Internet And Cybersecurity Flashcards

You may prefer our related Brainscape-certified flashcards:
1
Q

What are some threat to personal data?

A

Lost or damaged during a system crash -especially one affecting the hard disk.

Corrupted as a result of faulty disks or power failures.

Lost by accidentally deleting or overwriting files

Destroyed by natural disasters, acts of terrorism or war.

Lost or corrupted by computer viruses.

Hacked into by unauthorised users and deleted or altered.

Deleted or altered by employees wishing to make money or take revenge on their employer.

Stolen due to theft of components or thrown away components

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are some dangers that are inherent in using networks?

A

Hacking-just being connected to a network opens the data to the possibility of hacking.

Viruses- these may be sent via the internet, email, or as part of a hack.

Denial of service attack-prevents users from accessing the parts of a network that they can normally access, which can prevent business from operating at all.

Interception- if traffic can be intercepted then there is a possibility of accessing financial and personal data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What could happen if data is breached?

A

Cost the organisation money through lost business, payments to recover the data or payment of ransom demands.

Make customers lose trust in the business if they fail to keep their personal details safe.

Allow competitors to win business by gaining access to confidential client information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What can a network do to ask a user who they are?

A

Using suitable user ID and passwords.

Using a PIN.

Drawing a pattern on a smartphone.

Using face and voice recognition.

Sending an email confirmation to ensure they are the correct person when making an online order.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is a worm?

A

Like a virus but replicates itself before spreading to other programs and/or computers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is malware?

A

Term that covers any software attempt to disrupt computer systems.

Software that is designed to cause harm or damage to a computer. This includes viruses that might damage files, adware that causes pop-ups, and spyware that collects and shares login details.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is social engineering?

A

Where users are manipulated by cyber criminals into giving access to the network. This might be done with or without their knowledge.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is phishing?

A

In the most common form of phishing, a hacker pretends to be somebody in order to trick the user into disclosing sensitive data such as their user ID and password.

For example, this might be an email pretending to be a genuine message from the user’s bank containing a link to a website that looks like the real bank’s website.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is shoulder surfing?

A

A hacker watches a user to record the password or PIN they enter.

This might be by looking over their shoulder at a cashpoint before stealing their bank card and using it to withdraw money.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is unpatched software?

A

Occasionally a software manufacturer identifies potential security breaches in their own software and sends out patches to their registered users.

The patches update the software and fix the potential hazards.

A network manager is responsible for keeping up to date with the latest patches.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are key loggers?

A

Key loggers are programs that capture user input.

This data is then sent on to people with malicious intent.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is footprinting?

A

Footprinting is a technique used for actively gathering information about the different methods of gaining access to the system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are some techniques of foot printing?

A

Looking at employees’ social media to help them understand their habits and passwords.

Looking to see how customers are given access to some areas of the network.

Using the WHOIS database,which contains the contact names and email addresses of the network administrators for nearly all the websites on the internet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is penetration testing?

A

The purpose of penetration testing is to determine how resilient a network is against an attack.

It involves authorised users - sometimes an external party or organisation - probing the network for potential weaknesses and attempting to exploit them.

This is known as ‘ethical hacking’, as it is done with full permission from the organisation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are some policies of a network?

A

Users have a secure, hard-to-guess password that meets specified conditions

Users change their password on a regular basis

Users cannot connect unauthorised equipment, such as USB memory sticks,smartphones and tablets, to the network.

Levels of access allow only authorised users to access sensitive data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are some things a network manager can do to limit the possibility of hacking?

A

Ensure users have access only to the data they require for their role in the organisation.

Ensure all users to use secure passwords.

Encrypt data that is transmitted over a network.

17
Q

What should a manger restrict access to?
Examples

A

A network manager should restrict most users, allowing access to only the facilities they need.

For example, an office worker might need access to productivity software, email and the internet, but not to install software or access other users’ accounts.

Email.
Internet.
Documents and data.

18
Q

What communications can be encrypted?

A

Purchases made online are encrypted to try to prevent theft of credit card details.

Tools enable a user to encrypt a document, such as a spreadsheet, before sending it to a colleague via the internet.

Satellite TV transmissions are encrypted to prevent users who do not subscribe from watching TV shows.