Topic 6 - Cyber Security Flashcards

You may prefer our related Brainscape-certified flashcards:
1
Q

What is authentication?

A

The act of verifying your identity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What does MAC address filtering do?

A

Allows you to block traffic from unknown machines or devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is a firewall?

A

A network security device that monitors and filters incoming and outgoing networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is encryption?

A

The process of encoding information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are the 5 reasons for hacking?

A

Hacktivist
Ethical
Financial gain
Achievement
Gaining information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is a hacktivist?

A

Someone who uses technology to announce religious, ideological or political messages

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is an ethical hacker?

A

A person employed to hack a network to find vunerabilities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is cybersecurity?

A

The practice of protecting systems, networks and programs from a digital attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is network security?

A

Any activity designed to protect a network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is malware?

A

Malicious software designed to gain access into a computer with malicious intent

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is a virus?

A

A self-replicating malware that spreads itself through a network and attaches itself to files

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is worms?

A

A self-replicating malware that spread through a network but doesn’t attach itself to files

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What do worms typically do?

A

Slow networks down

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is a trojan?

A

A piece of software that appears to perform a useful function but performs malicious actions.
Open a back door for a third party

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is ransomware?

A

A form of a virus that is self-replicating It encrypts files preventing the user access and will only decrypt files once a ransom is paid

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is spyware?

A

A malware that monitors and gathers information, such as monitoring internet usage for ads or keylogging to find passwords

17
Q

What is adware?

A

Software imbedded with ads

18
Q

What is a data breach?

A

A security incident in which sensitive or private data is stolen or views by an unauthorised user

19
Q

What are Denial-of-Service attacks (DoS)?

A

When cyber criminals flood a server with requests to overload the system

20
Q

What are Distributed-Denial-of-Service attacks (DDoS)?

A

When multiple devices flood a server with requests

21
Q

What is a zombie?

A

A computer compromised by malware, typically used for DDoS attacks

22
Q

What is a brute force attack?

A

A attack where the cybercriminal tries multiple passwords

23
Q

What is social engineering?

A

A set of methods used by cybercriminals to deceive an individual to hand over money or information

24
Q

What is blagging?

A

When a hacker invents a fake scenario to convince the victim to give up money or data
Usually they maintain conversation

25
Q

What is phishing?

A

When the attack sends a malicious link via email which either steals money or data

26
Q

What is pharming?

A

A link that redirects the victim to a fake site
Done by changing the domain name

27
Q

What is shouldering?

A

Physically stealing data or passwords by sight

28
Q

What is eavesdropping?

A

Physically listening in on personal conversations to get details

29
Q

What is tailgating?

A

A physical security breach into secured premises

30
Q

What is an encryption key?

A

A piece of information used to encrypt and decrypt data

31
Q

What is symmetric encryption?

A

When 1 key is used to encrypt and decrypt messages
But if the key becomes public all messages can be decrypted

32
Q

What is asymmetric encryption?

A

When there is a public and private key. Everyone knows the public key but only sender and receiver have private key so it is more secure

33
Q

What is SQL injection?

A

It exploits an error in software design, enabling criminals to have access to sensitive data and too change, and delete data

34
Q

What are code reviews?

A

A process that helps organisations find vulnerabilities

35
Q

What is two-factor authentication?

A

When you are sent a unique code via text or email to confirm your identity
Biometrics

36
Q

What are misconfigured access rights?

A

When somebody has access to something they shouldn’t

37
Q

Why is removable media a security risk?

A

They may contain malware that could spread through a network to other devices