Learning Aim B - Cyber Security Flashcards

All of the key parts of Learning Aim B, including Social Engineering & Security

1
Q

Hacking

A

Unauthorised access to a computer system. Covered by the Computer Misuse Act 1990

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Why are systems attacked?

A
  • Fun
  • Financial Gain
  • Industrial Espionage
  • Personal Attacks
  • Hacktivism (hacking for activism)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Types of Hackers

A
  • Black Hat - a hacker with malicious intent
  • Grey Hat - a hacker with neither malicious or heroic intent
  • White Hat - a hacker with heroic intent to stop other hackers
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Types of threat to a computer system

A
  • Unauthorised access
  • Virus
  • Worm
  • Botnet / DDoS Attack
  • Rootkit
  • Trojan
  • Ransomware
  • Spyware
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Virus

A

A computer program or part of a computer program that can make copies of itself and is intended to prevent the computer from working normally

Cambridge Dictionary

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Worm

A

Aa harmful computer program that can copy itself and spread across a number of connected computers

Cambridge Dictionary

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Botnet

A

A group of computers that are controlled by software containing harmful programs, without their users’ knowledge

Cambridge Dictionary

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

DDoS

A

Distributed Denial of Service: an occasion when a computer network or website is intentionally prevented from working correctly, by a botnet sending lots of data at once.

Cambridge Dictionary (mod.)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Rootkit

A

A type of malware designed to give hackers access to and control over a target device. Most rootkits affect the software and the operating system.

Kaspersky

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Trojan

A

A computer program that has been deliberately designed to destroy information, or allow someone to steal it.

Cambridge Dictionary

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Ransomware

A

Software designed by criminals to prevent computer users from getting access to their own computer system or files unless they pay money.

Cambridge Dictionary

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Spyware

A

Software that collects information about how someone uses the internet, or personal information such as passwords, without the user knowing about it

Cambridge Dictionary

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Social Engineering

`

A

Manipulating people so that confidential information can be found out.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Why does social engineering work?

A

Most people want to do the right thing, and this is why it works. In a recent study, 60% of unauthorised USB drives were mounted to a computer and used in a controlled environment.

United States Department of Homeland Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Types of Social Engineering

A
  • Phishing - Where an individual poses as a legitimate company to steal sensitive information
  • Pharming - Where a user is redirected from a legitimate site to another
  • Shoulder Surfing - Where somebody physically looks at somebody’s computer system to steal sensitive information
  • Tailgating - Where a hacker gains unauthorised access to a password-protected system
  • Baiting - Where a scammer uses a false promise to steal personal information
  • Pretexting - Where an attacker tries to convince a victim into giving up valuable information
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

How to detect Social Engineering

A
  • Are they using correct grammar and spelling?
  • Are they addressing you, or a generalised person?
  • Are they asking for personal information?
  • Are they being urgent?
  • Are they asking you to check a link? Check the link before you click it and compare it to internet searches.
17
Q

Man in the Middle Attack

A

Where a hacker intercepts a message between two users without their knowledge.

18
Q

Internal Threats

A

A threat carried out by a trusted individual in an organisation. These are usually accidental and not malicious, but there is a minority who do this on purpose.`

19
Q

Why do Internal Threats happen?

A
  • Carelessness
  • Not following organisation’s procedures
  • Not understanding risks of the user’s actions.
20
Q

Drive-by Downloads

A

By only visiting the website, the device can be infected (often with a worm).

21
Q

Malware in Adverts

A

Malware can be embedded into advert iframes and on a legitimate website and be downloaded onto the computer

22
Q

Search Engine Poisoning

A

Where websites abuse SEO tools and pack the website with trending and viral keywords to drive traffic to the site.

23
Q

P2P Sharing Sites

A

Peer-to-Peer sites often have trojans in them, so are downloaded when sharing/downloading files on a P2P site.

24
Q

Impacts of an Internal Threat

A
  • Data and financial loss
  • Damage to reputation
  • Reduction in productivity and downtime
  • Legal Action (Data Protection Act)
25
Q

Firewall

A

A physical device/piece of software that stops a cyber security threat from moving from one network/device to another.

26
Q

Hardware Firewall

A
  • Protect an entire network
  • Are complicated to setup
  • Often offer more security than software firewalls
  • Are hard to bypass
27
Q

Software Firewall

A
  • Protects a single device
  • Are easy to setup
  • Offer less security than hardware firewalls
  • Easier to buypass
28
Q

Device Hardening Policy

A

Steps that are required to be carried out in an organisation in order to reduce threats to a computer system

29
Q

Types of Device Hardening

A
  • Using a password manager
  • Keeping software and OSes up to date
  • Removing unused software
  • Removing unused accounts
30
Q

Symmetric Encryption

A

More vulnerable than asymmetric encryption.

31
Q

Asymmetric Encryption

A

Where the device and the host have a pair of keys which have to match. These are not symmetrical so are hard to guess.

32
Q

Types of policy

A
  • Password Policy - define how long, complex and how long a password can be used for is.
  • Acceptable Use Policy - how you are expected to use a computer and the sanctions if you do something prohibited.
  • Device Hardening Policy - what software you should use and how to keep the computer system safe.
  • Backup Policy - how regularly devices are backed up, how and where.
  • Disaster Recovery Policy - Who is responsible for doing what to restore an organisations infrastructure when a cyber attack or physical damage to a computer system occurs