Security Risks And Precautions Flashcards

1
Q

What is a digital certificate?

A

An electronic document used to confirm the identity of a person or organisation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

In symmetric encryption…

A

Both the key for encrypting and the key for decrypting are the same and are agreed before information is transmitted

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is data encryption?

A

When information is jumbled to make it unreadable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

How does encryption help against hacking?

A

Any sensitive data intercepted by a hacker will be useless as it will be unreadable.
Any data on a stolen laptop/backing storage device is protected

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is symmetric key encryption?

A

A type of key based encryption which uses the same key agreed by both parties before transfer of information can begin

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the drawback of symmetric key encryption?

A

The encryption key must be transmitted between two parties without it being intercepted.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Public Key Encryption: What is involved?

A

Both public and private key are generated to work as a pair. The private key can encrypt data which can only be decrypted by the linked public key and vice versa.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

How SSL uses public key encryption on a secure website

A

Users browser receives websites public key
Private key remains on the server secured
Public key is used to encrypt sent data
Private key can then decrypt the message once data arrives in the server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is a digital signature?

A

An electronic signature contained within a digital certificate used to prove the identity of a sender of data or the signer of a document whilst making sure that the original data remains untampered with

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Who uses digital signatures in the real world?

A

Supported by a wide variety of software packages - helpful to those who wish to send legally important messages

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Public Key infrastructure purpose

A

To allow companies and individuals to state that the identity information and the public key confirmed by digital signature belong together

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Digital certificate contents

A

Digital signature
Name
Serial number
Expiration date

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Digital Certificate purpose

A

To make use of a public key in order to bind the digital signature and identity together.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is validation?

A

The process of checking data to be appropriate before processing starts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is involved in Client-Side validation checks?

A

Checks are made by the users browser using a scripting language such as JavaScript

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is used in checks made in server-side validation?

A

All info is checked (and verified) by the server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What are the advantages of client-side validation?

A

Faster than server side validation - processing takes place on users computer
Saves time for info which doesn’t need to be sent between the client and the server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What are the disadvantages of client-side validation?

A

More prone to data interception

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What are the advantages of server-side validation?

A

Users cannot interfere with data transfer - it is more secure, data validation cannot be disabled and centrally held data may be updated

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What are the disadvantages of server-side validation?

A

Slower process than client-side validation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What are the advantages of using biometrics for security?

A

Harder to forge
Cannot lose them, unlike passwords
Cannot use them without authorisation like ID cards

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Using biometrics for security purpose - Disadvantages/Concerns

A

Invasion of privacy, too intrusive on the public by security

23
Q

How does a public key solve the problems which occur in symmetric key encryption during data transmission?

A

As symmetric key encryption uses one key only and thus can be intercepted during transmission.
Essentially only encrypted data is passed between users for a public key style encryption.

24
Q

What is the purpose of a firewall?

A

To form an internal barrier between a secure network and any other network

25
Q

Which act makes hacking illegal?

A

The computer misuse act

26
Q

What is a virus?

A

A self replicating program which must be attached to a program

27
Q

What are the differences between a virus, worm and Trojan?

A

A virus copies itself into other executable programs
A worm does not need to be attached to another program and does not always cause damage. It replicates itself.
A Trojan does not replicate itself.

28
Q

Why might an employer use a key logger?

A

To check up on what their employees are doing online and keep track of their usage, Internet browsing history, how they make use of company resources

29
Q

How might you identify a possible phishing email?

A

Spelling mistakes
Sent to someone without addressing them by name
Sender address
Request sensitive information

30
Q

Describe what spyware is

A

Spyware is a type of malware used to gather information about a group or individual using methods such as monitoring keystrokes

31
Q

Describe what phishing is?

A

A form of fraud in which the attacker tries to gain sensitive information such as login credentials, usually acting as a known contact and sending a scam email requesting the information

32
Q

Describe what is meant by key logging?

A

Considered to be a type of spyware as well as software. Is capable of recording every keystroke made on a keyboard to a log file.

33
Q

What is online fraud and identity theft?

A

Online fraud is a fraud committed online. Identity theft is when someone else uses or steals your identity, often with the aim of committing online fraud.

34
Q

What is spam?

A

Usually refers to junk email and is often used in identity theft

35
Q

What is credit card fraud?

A

Any kind of theft and fraud committed involving a payment card in which the attacker does not own and in which the attacker usually aims to make use of to gain funds or obtain goods without paying.

36
Q

Name a type of definitely malicious software

A

Spyware - Installed without the users permission

37
Q

What is spyware?

A

Monitors user activity and transmits that information in the background to someone else

38
Q

Phishing

A

Emails or websites which trick users into entering personal details, which are then used illegally

39
Q

Adware

A

Software product where you will be viewing sponsored advertisements until a commercial fee is paid

40
Q

Type of malicious activity which is equally as dangerous to large corporations as it is to an individual user

A

Keylogging

41
Q

Identity Theft

A

The crime of obtaining the personal or financial information of another person for the purpose of making purchases or transactions under their name or identity

42
Q

A zombie

A

A computer compromised by a hacker

43
Q

What is sent from the compromised computer to the attacker in a DDoS attack?

A

The IP address

44
Q

Botnet

A

A group of compromised computers in a DDoS attack

45
Q

Symmetric Key Encryption

A

Same key is used to encrypt and decrypt a message

46
Q

Public Key use

A

Used by all people - sent to a particular individual

47
Q

Less secure form or validation

A

Client side

48
Q

More secure form of validation

A

Server side

49
Q

Three steps involved in biometric analysis

A

Observation or collection of the data
Conversion and Description of the observed data using a digital representation called a template
Comparison of new data with one or more previous templates stored in a database

50
Q

Technique designed to deal with spoof attacks on biometrics

A

Liveness detection algorithms

51
Q

When a biometric scan take place a match is achieved by

A

The live scan being similar to the stored scan data

Degree of similarity is adjusted by system to increase or decrease strictness of the system

52
Q

Denial of Service Attacks

A

Designed to prevent a user from accessing a computer system, server or website
Aim to create a situation where the resources of the attacked system are flooded with so many processing requests that the system can no longer carry out its intended purpose

53
Q

Biometric Data Examples

A

Fingerprints and Retina Patterns

Used instead of passwords to gain access to systems and data