System Security Flashcards

1
Q

What vulnerabilities can attackers make effective use of?

A

Out of date anti virus/malware software
Unpatched software (unupdated)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What 6 things should be looked out for in a phising email?

A

Forged email (usually a variation of a real one)
Impersonal greeting (they dont know who you are)
Asking for personal info within the email
Forged website link (may look real, roll your mouse over it)
A sense of urgency (consequences if you dont comply)
Poor spelling and grammar

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is a MITM attack?

A

A man in the middle attack is when somebody is listening in on web traffic (eavesdropping) to gain or alter information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

How can you protect your mobile phone? (6)

A

• Use the password feature and choose a strong password
• Make sure the data is encrypted
• Do not follow links in suspicious emails
• Think carefully before posting your mobile phone number on public websites
• Don’t install apps without researching them first – if they require unnecessary extra permissions, don’t install them
• Delete all information stored on your mobile before discarding

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

(7) ways that you can prevent vulnerabilities in a computer system?

A

penetration testing
anti-malware software
firewalls
user access levels
secure passwords
encryption
physical security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly