System Security Flashcards

1
Q

What is cybersecurity?

A

Cybersecurity refers to the protection of computer systems, networks, and data from digital attacks, damage, or unauthorised access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is malware?

A

Malware (malicious software) is software designed to harm, exploit, or disrupt systems, such as viruses, worms, trojans, ransomware, and spyware.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is a virus?

A

A type of malware that attaches itself to files or programs and spreads when they are opened or run.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is a worm?

A

A self-replicating malware that spreads across a network without user action.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is a Trojan horse?

A

Malware disguised as legitimate software that users are tricked into installing, allowing hackers access to the system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is ransomware?

A

Malware that encrypts files and demands payment for decryption.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is spyware?

A

Software that secretly monitors user activity and sends information to a third party.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is phishing?

A

A method of social engineering where attackers pretend to be trustworthy sources (usually via email) to steal personal information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is social engineering?

A

Manipulating people into giving up confidential information (e.g., passwords) rather than attacking systems directly.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is a brute force attack?

A

An attack that tries every possible combination of passwords until the correct one is found.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is a denial of service (DoS) attack?

A

An attack that floods a server with traffic to overwhelm it and make services unavailable.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is SQL injection?

A

A code injection technique where attackers input malicious SQL into a form to manipulate a database and gain access to data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

How can strong passwords help prevent cyber attacks?

A

They are harder to guess or brute-force, making unauthorized access more difficult.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are some ways to prevent cyber security threats?

A

• Use strong passwords
• Install antivirus software
• Enable firewalls
• Keep software updated
• Train users on phishing and safe practices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is penetration testing?

A

A simulated cyberattack carried out to test and identify vulnerabilities in a system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are user access levels and why are they used?

A

Different levels of permissions given to users (e.g., admin vs. guest) to control who can access what — improves security by limiting access.

17
Q

What is anti-malware software?

A

Software that detects, prevents, and removes malicious programs.

18
Q

What is a firewall?

A

A security system that monitors and controls incoming and outgoing network traffic based on predetermined rules.

19
Q

What is meant by ‘network forensics’?

A

The process of monitoring, recording, and analysing network traffic to investigate and prevent cybercrime.

20
Q

What is the purpose of automatic software updates?

A

To fix vulnerabilities and security holes in software as soon as they are discovered.

21
Q

What are the main types of social engineering attacks?

A

Phishing, pretexting, baiting, and tailgating.

22
Q

Why is educating users important in cyber security?

A

Because users are often the weakest link — training helps prevent errors like clicking on phishing emails.