Topic 6-Cyber security Flashcards

1
Q

What is cyber security?

A

Protecting networks, computers, data and programs from attack damage or unauthorized access and is done through processes practices and technologies.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is social engineering?

A

Art of manipulating people so they divulge personal information such as passwords. Blagging, phishing and shouldering are all examples.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

How can you protect against social engineering?

A

Public awareness, policies and education.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is blagging?

A

The act of obtaining/disclosing personal data or information without the owners consent. This can be prevented by security training.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is phishing?

A

Phishing emails are designed to steal money, get login details or steal and identity. Usually done through email or SMS. Remember to look for spelling or grammar mistakes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is shouldering?

A

Using direct observation techniques to gain information such as passwords.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is malicious code(malware)?

A

Hostile or intrusive software.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

How can malware spread?

A

Through attachments and links.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is a macro?

A

Small piece of code that is given permission to run on the device, found in attachments and are set to install malware of other sorts.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is a virus?

A

Program installed onto computer without your knowledge or permission with the purpose of doing harm. It cannot copy itself on its own it has to infect a program.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is a worm?

A

Self replicating virus.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is a trojan?

A

Any form of malware which tricks the user into installing it by pretending to be a legitimate program.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is ransomware?

A

Encrypts files on an infected system and only decrypts files once a payment is made to the hacker.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is spyware?

A

Gathers information about a user by tracking their activity without their consent. Key loggers and screen capture software’s are two examples.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is a rootkit?

A

Malware which modifies the OS to avoid detection by anti-virus and ant-malware software.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is a backdoor?

A

Malware which opens up an access channel to a computer that other malware can use to get in/gain access.

17
Q

What is an insider attack?

A

When someone inside of an organisation gives away access details or data.

18
Q

What is a passive attack?

A

When a hacker eavesdrops on a network by “sniffing” the data packets.

19
Q

What is an active attack?

A

When someone uses malware or other technical methods to compromise a networks security.

20
Q

What are the two ways of cracking passwords?

A

Brute force and dictionary.

21
Q

What are misconfigured access rights?

A

Allows the employees/students to access more data than they should be able to in their position. If a hacker hacks a computer they will only be able to see what that person can access.

22
Q

What is removable media?

A

USB sticks or removable hard drives can cause data theft and virus infection.

23
Q

What is unpatched or outdated software?

A

Vulnerable to attacks as software may not be able to detect viruses or malware. People update software to protect it from known methods.

24
Q

What is adware?

A

Software that either causes pop-ups or windows. These will not close. Used by companies legit, but when installed without knowledge or intent to gather browser information it is malicious.

25
Q

What is penetration testing?

A

The process of attempting to compromise a networks security in a controlled manner so the company can patch and increase their network’s security.

26
Q

What is black box penetration testing?

A

The ethical hacker has no knowledge of the system being attacked. This can simulate external attacks.

27
Q

What is white box penetration testing?

A

The tester has prior knowledge of the system being attacked. This saves time and cost and can simulate an insider attack.

28
Q

What is the difference between anti-malware and anti-virus?

A

Antimalware focuses on new threats, while antivirus keeps you protected against the traditional versions, like worms and phishing attacks, that can still harm your device. Think of antivirus as proactive protection against threats infecting your device while antimalware roots and destroys activated malware.

29
Q

What is biometrics?

A

Physical characteristics that are quite unique.

30
Q

What does CAPTCHA stand for?

A

Completely automated public turing test to tell computers and humans apart.

31
Q

Why are software updates automated?

A

So user does not have to do it themselves as they could forget.

32
Q

What is a denial of service attack?

A

Prevents users from accessing parts of a network that they normally could.

33
Q

What is a distributed denial of service attack?

A

Uses botnets to overflow systems with traffic to stop them from working. Firewalls can blacklist IP’s.

34
Q

What is a botnet?

A

Network of private computers infected with malicious software and controlled as a group without the owners knowledge.

35
Q

White, grey and black hat hackers.

A

White-payed to hack programs for safety
Grey-does it for right reason but against the law
Black-does it for wrong reason for personal gain(against the law).

36
Q

What is pharming?

A

Technique intended to redirect a websites traffic to another fake website and you will be asked to give personal details.