Security risks and prevention Flashcards

1
Q

what is social engineering

A

manipulating someone to reveal confidential information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

what are 3 social engineering techniques

A

blagging
phishing
shouldering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

what is blagging

A

the use of deception to gain access to confidential information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

what is phishing

A

a fake email that looks legitimate but is used to steal personal information such as passwords or credit card numbers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

what is shouldering

A

physically standing behind someone or looking over their shoulder to gain personal information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

what is a prevention method for blagging

A

always be cautions and verify edentity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

what is a prevention method for phishing

A

block sender
don’t open suspicious links
check email address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

what is a prevention method for shoulerign

A

be aware of surroundings
use you hands to block veiw

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

what are 8 types of malware

A

virus
trojan
adware
worm
bot
spyware
ransomware
rootkit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

what is a virus

A

can copy itself and spread throughout a network by attaching itself to files.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

what is trojan

A

a file that pretends to be a normal file or program but one downloaded will perform malicious tasks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

what is adware

A

creates adds that pop on users screen and direct them elsewhere

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

what is a worm

A

a malware that will spread and exploit a network and use up its bandwidth

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

what is a rootkit

A

provides remote access to the computer which can allow a hacker to steal personal data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

what is ransomware

A

prevents the user from being able to access their data until a ransom is paidw

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

what is spyware

A

malware that tracks the user’s activity without them noticing

17
Q

what is and example of spyware

A

key loggers

18
Q

what is abot

A

used to flood servers in DDOS attacks

19
Q

what are the 3 types of hackers

A

white hat
black hat
grey hat

20
Q

what is white hat hacker

A

ethical hackers that are given legal permission to test a systems security.

21
Q

what is back hat hacker

A

a criminal hacker that illegally attacks computers with malicious intent

22
Q

what is grey hat hackers

A

hackers that do not have malicious intents and try to gain access to their own findings

23
Q

what are 4 other network threats

A

brute force
SQL injection
Data interception and theft
DOS

24
Q

what is a brute force attacki

A

using automated software to try millions of different password combinations

25
Q

what is a SQL injection

A

used to interfere with databases by entering SQL commands into forms, which can reveal confidential data

26
Q

what is a packet sniffer

A

intercept data packets across a network and analyze them for sensitive data such as passwords

27
Q

what is DOS attack

A

sending useless requests to a network so that gets overloaded and cannot deal with lear requests and causing it to eventually crash

28
Q

what are 6 ways to prevent malicious attacks

A

pen testing
anti-malware software
physical security
encryption
user access levels
strong passwords

29
Q

what is pen testing

A

when a company hires another company to test their security and identify them of any vulnerabilities

30
Q

what is antimalware software

A

a computer program that can detect and remove malware that is injected into the systme

31
Q

what is physical security used for

A

prevent datames to physical parts of network

32
Q

what are 4 examples of physical security

A

locks
biometrics
CCTV
alarms

33
Q

what is encryption

A

scrambling data to make it unreadable and harder for hackers to intercept

34
Q

what are user access levels

A

used to limit access that users have to certain data.