Topic 6-Cyber security Flashcards
What is cyber security?
Protecting networks, computers, data and programs from attack damage or unauthorized access and is done through processes practices and technologies.
What is social engineering?
Art of manipulating people so they divulge personal information such as passwords. Blagging, phishing and shouldering are all examples.
How can you protect against social engineering?
Public awareness, policies and education.
What is blagging?
The act of obtaining/disclosing personal data or information without the owners consent. This can be prevented by security training.
What is phishing?
Phishing emails are designed to steal money, get login details or steal and identity. Usually done through email or SMS. Remember to look for spelling or grammar mistakes.
What is shouldering?
Using direct observation techniques to gain information such as passwords.
What is malicious code(malware)?
Hostile or intrusive software.
How can malware spread?
Through attachments and links.
What is a macro?
Small piece of code that is given permission to run on the device, found in attachments and are set to install malware of other sorts.
What is a virus?
Program installed onto computer without your knowledge or permission with the purpose of doing harm. It cannot copy itself on its own it has to infect a program.
What is a worm?
Self replicating virus.
What is a trojan?
Any form of malware which tricks the user into installing it by pretending to be a legitimate program.
What is ransomware?
Encrypts files on an infected system and only decrypts files once a payment is made to the hacker.
What is spyware?
Gathers information about a user by tracking their activity without their consent. Key loggers and screen capture software’s are two examples.
What is a rootkit?
Malware which modifies the OS to avoid detection by anti-virus and ant-malware software.
What is a backdoor?
Malware which opens up an access channel to a computer that other malware can use to get in/gain access.
What is an insider attack?
When someone inside of an organisation gives away access details or data.
What is a passive attack?
When a hacker eavesdrops on a network by “sniffing” the data packets.
What is an active attack?
When someone uses malware or other technical methods to compromise a networks security.
What are the two ways of cracking passwords?
Brute force and dictionary.
What are misconfigured access rights?
Allows the employees/students to access more data than they should be able to in their position. If a hacker hacks a computer they will only be able to see what that person can access.
What is removable media?
USB sticks or removable hard drives can cause data theft and virus infection.
What is unpatched or outdated software?
Vulnerable to attacks as software may not be able to detect viruses or malware. People update software to protect it from known methods.
What is adware?
Software that either causes pop-ups or windows. These will not close. Used by companies legit, but when installed without knowledge or intent to gather browser information it is malicious.