Section A Flashcards

1
Q

What is an internal threat

A

An internal threat refers to the risk of someone inside a company that could exploit a system to cause damage or steal data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is an external threat

A

An external threat refers to someone outside of a company that attempts to exploit system vulnerabilities such as hacking or social engineering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is Malware

A

Software that is designed to cause harm to your IT system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is spyware

A

This is a form of malware that gathers information after infecting a user and secretly sending it to third-party users

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is ransomware

A

This prevents you from accessing your computer, it often encrypts the storage devices and demands a sum of money, in order to gain access back

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are rootkits

A

They are used to get unauthorised remote administrator access, they spread by hiding software by appearing to be legitimate, but can steal data or hide other malware within the system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is commercial hacking

A

When Companies hack for the purpose of corporate espionage, finding out about their competitor plans, products and finances

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is government hacking

A

This when companies or governments hire white hat hackers to detect system vulnerabilities so that they can prevent black hat hackers from getting in the system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is sabotage

A

Sabotage refers to the activity used to deliberately disrupt services this could include distributing malware and denial of service attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is social engineering

A

This refers to techniques that are used to deceive people to give their private and confidential information, this can be through the form of a phishing email.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is operational loss

A

This refers to a loss that damages the capability of an organisation, such as manufacturing output, service availability or service data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is financial loss

A

This refers to the loss where an organisation loss wealth, such as compensation, legal fees or increased costs due to the threat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is a system vulnerability

A

This refers to a weak point in the system which can be exploited

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is the data protection act?

A

This act was introduced in 1998 to protect the privacy of individuals by ensuring that their confidential is processed in an ethical manner

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Who is responsible for investigating possible data protection violations ad what are the consequences

A

The information commissioners office is an independent body that is responsible for this, if an organization has been breaching any of these regulations they can be fined up to £500000

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is the general data protection regulations

A

This was enforced on 25th May 2018 in the EU member states, this replaced the DPA but most of it is similar

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

LIST 3 POINTS OF THE DATA PROTECTION ACT

A
  • PERSONAL DATA SHOULD NOT BE KEPT FOR LONGER THAN IT’S NECESSARY PURPOSES
  • PERSONAL DATA SHOULD NOT BE TRANSFERRED TO A COUNTRY OR TERRITORY OUTSIDE THE EU WITHOUT ADDEQUATE PROTECTION
  • APPROPIATE TECHNICAL AND ORGANISATIONAL MEASURES SHOULD BE TAKEN TO PROTECT DATA
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

WHAT IS THE COMPUTER MISUSE ACT

A

THIS LAW BROUGHT INTO FORCE TO PROTECT USERS AGASINT THEFT AND DAMAGE OF THE INFORMATION STORED ON THEIR IT SYSTEMS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What is the telecommunications law(2000)?

A

This law allows businesses to monitor the activity on their network so that they can protect themselves from cyber threats.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What were the 3 crimes that were covered by the computer misuse act?

A

Offence 1 - unauthorised access to computer material could result in 2 years of imprisonment
Offence 2 - unauthorised access with the intent to cause harm or damage, this can result in up to 5 years of imprisonment
Offence 3 - impairing the operation of a computer, this could include changing data, is punishable of 10 years imprisonment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What rules do organisations need to comply with when monitoring employees on their network

A
  • To be ensured that legislations of the company are being followed
  • To ensure employees are fulfilling their duties
  • To prevent or detect crime
  • To secure and ensure the effective operation of the network
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What is a network vulnerability

A

They are a major source of attacks on a business’s attacks, an example of this are firewall ports

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

GIVE 3 EXAMPLES OF ORGANISATIONAL VULNERABILITIES

A
  • FILE PERMISSIONS AND PRIVILIGES ASSIGNED TO EMPLOYEES COULD LEAVE THEM OPEN TO MANY THREATS
  • THE PASSWORD POLICY
  • IF AN ORGANISATION GIVES STAFF FULL PERMISSION AND PRIVILIGES THEN ANYONE WITH THE EMPLOYEES LOGIN CAN CAUSE DAMAGE TO THE SYSTEM
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

GIVE 2 EXAMPLES OF SOFTWARE VULNERABILITIES

A
  • DOWNLOADED SOFTWARE THAT CAN COME FROM WEBSITES CAN BE UNTRUSTWORTHY AS THEY CAN HAVE MALWARE
  • ILLEGAL COPIES CAN ALSO HAVE MALWARE AND ALSO ILLEGAL COPIES DON’T HAVE UPDATES WHICH LEAVES YOUR SYSTEM VULNERABLE
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

WHAT ARE OPERATING SYSTEM VULNERABILITIES CAUSED BY

A

THEY CAN CONTAIN CODING VULNERABILITIES WHICH CAN BE EXPLOITED BY HACKERS, IF YOUR OPERATING SYSTEM IS UNSUPPORTED OR ISN’T REGULARLY UPDATES IT CAN BE OPEN TO MALICIOUS USERS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

WHAT CAN MOBILE DEVICE VULNERABILITIES CAUSED BY

A
  • ORIGINAL EQUIPMENT MANUFACTURER MAY TAKE TIME TO RELEASE UPDATES
27
Q

WHAT ARE PHYSICAL VULNERABILITIES

A

A WEAKNESS IN PHYSICAL STRUCTURE OR ENVIRONMENT THAT CAN BE CAUSED BY NATURAL DISASTERS, ACCIDENTS OR HUMAN ACTIONS

28
Q

GIVE 3 EXAMPLES OF PHYSICAL VULNERABILITIES

A
  • THEFT OF IT EQUIPMENT
  • USB DEVICES MAY HAVE A VIRUS WHICH COULD TRANSFER FILES FROM ONE DEVICE TO ANOTHER
  • SOCIAL ENGINEERING SUCH AS PHISHING OR AN ATTACKER GAINING UNAUTHOURISED ACCESS
29
Q

WHY CAN CLOUD COMPUTING BE A VULNERABILITY

A

BECAUSE FILES STORED USING CLOUD COMPUTING WILL BE AVAILABLE OVER THE INTERNET WHICH LEADS TO A POSSIBILITY OF OUR DEVICES BEING HACKED

30
Q

WHAT ARE IOT DEVICES

A

THIS IS THE INTER-CONNECTIVITY OF NON-STANDARD COMPUTING DEVICES SO THAT THEY GATHER AND SHARE DAAT TO DO SOMETHING

31
Q

WHY ARE IOT DEVICES VULNERABLE

A

BECAUSE THEY ARE NOT DEVELOPED WITH SECURITY IN MIND AND CAN BE AFFECTED BY THINGS LIKE MALWARE

32
Q

WHAT IS THE FRAUD ACT (2006)

A

WHEN SOMEONE ACTS DISHONESTLY TO MAKE A GAIN OR CAUSE A LASS, IF IF NOTHING THE ATTEMPT IS SUFFICIENT

33
Q

WHAT ARE THE 3 CLASSES THAT THE OFFENCES CAN BE SPLIT INTO

A
  • FRAUD BY FALSE REPRESENTATION
  • FRAUD BY FAILING TO DISCLOSE INFORMATION
  • FARUD BY ABUSE OF POWER
34
Q

WHAT IS THE HEALTH AND SAFETY AT WORK ACT(1974)

A

THIS IS THE PRIMRARY LEGISLATION FOR ENSURING THE HEALTH, SAFETY AND WELAFARE OF STAFF AT WORK

35
Q

WHAT ARE THE DUTIES THAT EMPLOYEES MUST PERFORM SO THAT THEY COMPLY WITH THE HEALTH AND SAFETY ACT

A
  • PROVIDE A SAFE SYSTEM OF WORK
  • PROVIDE INFORMATION, INSTRUCTIONS AND TRAINING AND SUPERVISION
  • MAINATAIN THE WORK PLACE IN A CONDITION THAT IS SAFE AND WITHOUT RISKS
  • PROVIDE A HEALTH AND SAFETY POLICY
36
Q

WHAT ARE SOME PHYSICAL SECURITY METHODS TO RESTRICT ACCESS

A

SIT SECURITY LOCKS
CARD ENTRY
BIOMETRICS
CCTV
PROTECTED CABLING
CABINETS

37
Q

WHAT ARE 3 TYPES OF BACK-UPS

A

FULL BACKUP - A COMPLETE BACK UP ALL YOUR DATA
INCREMENTAL BACKUP - A BACK UP OF THE DATA THAT HAS CHANGED SINCE THE PREVIOUS BACK-UP
DIFFERENTIAL BACKUP - A MIXTURE OF THE PREVIOUS TWO

38
Q

WHAT ARE 3 PLACES WE CAN STORE BACK UPS

A

ON-SITE BACKUPS - STORED IN THE SAME BUILDING AS THE ORIGINAL DATA
OFF-SITE BACKUPS - STORED IN A DIFFERENT LOCATION AS THE ORIGINAL DATA, THIS IS MORE SECURE BECAUSE YOUR DATA WILL BE PROTECTED FROM WHATEVER DAMAGED IT
CLOUD BACKUPS - DATA WILL BE STORED IN A DIFFERENT LOCATION BUT IS CONNECTED TO THE INTERNET

39
Q

WHAT IS ANTI-VIRUS SOFTWARE

A

A UTILITY PROGRAM THAT IS USED TO PREVENT MALICIOUS FROM INFECTING YOUR COMPUTEROR DETECT OR REMOVE MALICIOUS SOFTWARE THAT HAS ALREADY INFECTED YOUR COMPUTER

40
Q

WHAT ARE THE 2 DETECTION TECHNIQUES THAT ANTI-VIRUS USES

A

VIRUS SIGNATURES - THIS IS HOW ANTI-VIRUS DETECTS MALWARE, ANTI-VIRUS COMPANIES ANALYSE MALWARE AND IDENTIFY A PATTERN FOR THE MALWARE CODE
HEURISTIC TECHNIQUES - THIS MONITORS THE BEHAVIOUR OF PROGRAMS AND DETECTS ANYTHING THAT APPEARS SUSPICIOUS

41
Q

WHAT 3 OPTIONS DOES ANTI-VIRUS PRESENT

A

CLEAN - REMOVING THE MALWARE WITHOUT REMOVING THE FILE
QUARANTINE - THIS MOVES THE MALWARE TO A SECURE LOCATION ON THE COMPUTER AND PREVENTS IT FROM SPREADING
DELETE - REMOVES THE FILE FROM THE COMPUTER, A QUICK AND SAFE TO PROTECT YOUR SYSTEM BUT ANY DATA IN THAT FILE WILL BE GONE WITH IT

42
Q

WHAT ARE FIREWALLS

A

A HARDWARE DEVICE OR UTILITY PROGRAM THAT MONITORS INCOMING AND OUTCOMING NETWORK TRAFFIC AND BLOCKS ANY TRAFFIC THAT APPEARS SUSPICIOUS

43
Q

WHAT IS THE DIFFERENCE BETWEEN SOFTWARE AND HARDWARE FIREWALLS

A

HARDWARE FIREWALLS - A PHYSICAL DEVICE THAT WILL SIT BETWEEN YOUR LOCAL AREA NETWORK AND INTERNET
SOFTWARE FIREWALL - THIS WILL BE INSTALLED ON EACH INDIVIDUAL DEVICE

44
Q

NAME SOME TECHNIQUES FIREWALLS USE TO INSPECT DATA

A

PACKET FILTERING AND INSPECTION - THE FIREWALL INSPECTS EACH PACKET OF DATA AND COMPARES IT TO PRE-DEFINED RULES, IF THE PACKET IS FLAGGED BY THESE RULES IT WON’T BE ALLOWED TO PASS THROUGH
APPLICATION LEVEL AWARENESS - A FORM OF FIREWALL THAT CONTROLS THE INPUT AND OUTPUT OF PACKETS TO AN APPLICATION, IMPORTANT BECAUSE IF A HACKER TRIES TO GACK AND GETS THROUGH THE APPLICATION LAYER, THERE IS AN EXTRA LAYER OF PROTECTION

45
Q

WHAT ARE INPUT AND OUTBOUND RULES

A

THESE ARE PART OF THE FILTERING PROCESS
INBOUND RULES - WILL DEFINE WHAT DATA SHOULD BE ACCEPTED, REJECTED AND DROPPED FROM ENTERING
OUTBOUND RULES - WILL DEFINE WHAT DATA CAN LEAVE THE NETWORK OR COMPUTER

46
Q

WHAT IS A NETWORK ADDRESS

A

AL DEVICES ON A NETWORK ARE ASSIGNED AN IP ADDRESS TO UNIQUELY IDENTIFY THEM.

47
Q

WHAT IS USER AUTHENTICATION

A

TO GAIN ACCESS TO AN OPERATING SYSTEM OR APPLICATION WE MUST AUTHENTICATE OURSELVES AS HAVING THE RIGHT TO THAT SYSTEM

48
Q

WHAT ARE GRAPHICAL PASSWORDS

A

THIS IS WHEN THE USER IS PRESENTED WITH A SCREEN FULL OF IMAGES AND THE USER WILL SELECT THE IMAGES IN A SPECIFIC ORDER

49
Q

WHAT IS BIOMETRIC AUTHENTICATION

A

WHEN A USER AUTHENTICATES THEMSELVES WITH THEIR IDENTIFY
COMMON FORMS ARE:
- FINGER PRINT RECOGNITION
- FACIAL RECOGNITION

50
Q

WHAT IS 2 STEP VERIFICATION

A

AN ADDITONAL LAYER OF SECURITY BY ASKING THE USER TO VERIFY THEIR IDENTITY MORE THAN ONCE

51
Q

WHAT ARE SECURITY TOKENS

A

SMALL HARDWARE DEVICESN OFTEN IS A USB DEVICE YOU PLUG INTO YOUR COMPUTER OR A KEY FOB THAT USES NEAR FIELD KEYS TO WIRELESSLY AUTHENTICATE

52
Q

WHAT IS KNOWLEDGE BASED AUTHENTICATION

A

A USER WILL BE ASKED SOME QUESTIONS WHICH THEY MUST ANSWER CORRECTLY TO GAIN ACCESS

53
Q

WHAT IS THE KERBEROS NETWORK AUTHENTICATION

A

A CLIENT HAS TO AUTHENTICATE THEMSELVES WITH THE DOMAIN CONTROLLER, ONCE AUTHENTICATED THE CLIENT WILL BE ABLE TO REQUEST ACCESS TO THE RESOURCES FROM THE DOMAIN CONTROLLER FOR A PERIOD OF TIME, IT DOES THIS THROUGH A TICKETING SYSTEM TO AUTHENTICATE USERS WHICH IS ENCRYPTED USING DIFFERENT PASSWORDS

54
Q

CERTIFICATE-BASED AUTHENTICATION

A

USES A DIGITAL CERTIFICATE TO IDENTIFY A CLIENT ON A NETWORK

55
Q

WHAT ARE ACCESS CONTROLS

A

THIS RESTRICTS ACCESS TO FILES, FOLDERS, APPLICATIONS AND PHYSICAL RESOURCES

56
Q

WHAT ARE THE 3 MAIN AREAS OF ACCESS CONTROLS

A
  • AUTHENTICATION
  • AUTHORISATION
  • AUDIT
57
Q

WHAT IS TRUSTED COMPUTING

A

TECHNOLOGY THAT ENSURES HARDWARE HAS SECURITY BUILT-IN FEATURES SO THAT DEVICES WILL PERFORM IN PREDICTABLE AND SECURE WAYS

58
Q

WHAT IS ENCRYPTION

A

THE PROCESS OF CONVERTING A PIECE OF PLAIN-TEXT INTO AN ENCODED VERSION THAT IS UNREDABLE TO THE HUMAN EYE

59
Q

WHAT IS ENCYRPTION OF DATA AT REST

A

THIS REFERS TO THE DATA THAT IS STORED ON YOUR COMPUTER, THIS DATA IS ENCRYPTED USING SYMMETRIC ENCRYPTION WHICH MEANS THE SAME KEY IS USED TO ENCRYPT AND DECRYPT DATA

60
Q

WHAT IS SAFE PASSWORD STORAGE

A

WEBSITES SUCH AS FACEBOOK REQUIRE US TO CHOOSE A PASSWORD WHICH IS STORED ON THEIR SERVER, IF THE WEBSITE IS HACKED THEY COULD GAIN ACCESS TO ALL USER DETAILS THEREFORE STORED PASSWORDS SHOULD BE ENCRYPTED

61
Q

WHAT IS THE DIGITAL RIGHTS MOVEMENT

A

REFERS TO A TECHNOLOGY THAT ATTEMPTS TO CONTROL COPYRIGHTED MATERIALS, DRM USES ENCRYPTION TO PROTECT COPY RIGHT MATERIALS

62
Q

WHAT IS FILE, FOLDER AND DISC ENCRYPTION

A

ENCRYPTING THESE ARE USED WHEN GREATER SECURITY IS NEEDED, THIS IS DONE BY ENCRYPTING SPECIFIC AREAS OF OUR COMPUTER SO THAT OTHER USERS CAN’T ACCESS THEM

63
Q

WHAT IS ENCRYPTION OF DATA IN TRANSIT

A

DATA IN TRANSMIT IS DATA THAT’S BEING TRANSMITTED BETWEEN 2 DEVICES OVER A NETWORK. THIS DATA IS USUALLY ENCYRPTEDUSING ASYMMETRIC ENCRYPTION WHICH MEANS A DIFFERENT KEY IS USED TO ENCRYPT AND DECRYPT THE DATA

64
Q

WHAT IS THE ONION ROUTER

A

A METHOD SO THAT INDIVDUALS CAN USE THE INTERNET WITH ANONYMITY