Lesson 3 - Getting started with Tinkercad Flashcards

1
Q

What Cyber-threats are?

A

Cyber = anything relating to computers, Virtual reality (VR) & data on the internet
Threat = any malicious attempt to unlawfully damage, steal or disrupt a system
May lead to Cyber attack = computer network, system or website can be damaged or destroyed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

5 Types of cyber-threats

A

General Malware
Virus (subclass Worms)
Phishing
Pharming
Spoofing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

General Malware

A

Trojan Horse
Program disguised as legit software, infiltrates the system to discover financial info or destroy access to a system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Virus

A

Little bits of code hidden inside another program
When program is launched, virus multiplies in system memory & spreads itself to other computers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Worms

A

Program that replicates itself - “eating” system files until desk is empty

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Phishing

A

Electronic communication from a fraud, pretending to be from a reputable company, to extract personal information like login details, password, account #, pin codes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Pharming

A

Redirects a user from a legit website to a fake to steal information like login details, password, account #, pin codes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Spoofing

A

Someone impersonates a trusted source or person in order to steal data like victims identity or assets or spread malware by coaxing victim to open malware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Strong password typically consists of

A

at least 8 digits
1 or more capital letter(s)
a symbol
a number

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Bio-metric authentication

A

Employes to confirm the user is indeed the correct person
Biological characteristics eg Fingerprint scanners, Facial or voice recognition
Behavioural characteristics eg
typing or gait recognition

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Simulations

A

A situation in which a particular set of conditions is created artificially, in order to study or experience something that could exist in reality
We design simulations to imitate the effect of an experiment if it was conducted in the real world

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Advantages of using simulations

A

It does not require components to be bought, cost effective
Can be edited freely until best prototype is id, only one prototype built for final testing
Safe place for testing user can not be harmed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly