System Security Flashcards
What vulnerabilities can attackers make effective use of?
Out of date anti virus/malware software
Unpatched software (unupdated)
What 6 things should be looked out for in a phising email?
Forged email (usually a variation of a real one)
Impersonal greeting (they dont know who you are)
Asking for personal info within the email
Forged website link (may look real, roll your mouse over it)
A sense of urgency (consequences if you dont comply)
Poor spelling and grammar
What is a MITM attack?
A man in the middle attack is when somebody is listening in on web traffic (eavesdropping) to gain or alter information
How can you protect your mobile phone? (6)
• Use the password feature and choose a strong password
• Make sure the data is encrypted
• Do not follow links in suspicious emails
• Think carefully before posting your mobile phone number on public websites
• Don’t install apps without researching them first – if they require unnecessary extra permissions, don’t install them
• Delete all information stored on your mobile before discarding
(7) ways that you can prevent vulnerabilities in a computer system?
penetration testing
anti-malware software
firewalls
user access levels
secure passwords
encryption
physical security