Topic 6 - Cyber Security Flashcards
What is authentication?
The act of verifying your identity
What does MAC address filtering do?
Allows you to block traffic from unknown machines or devices
What is a firewall?
A network security device that monitors and filters incoming and outgoing networks
What is encryption?
The process of encoding information
What are the 5 reasons for hacking?
Hacktivist
Ethical
Financial gain
Achievement
Gaining information
What is a hacktivist?
Someone who uses technology to announce religious, ideological or political messages
What is an ethical hacker?
A person employed to hack a network to find vunerabilities
What is cybersecurity?
The practice of protecting systems, networks and programs from a digital attack
What is network security?
Any activity designed to protect a network
What is malware?
Malicious software designed to gain access into a computer with malicious intent
What is a virus?
A self-replicating malware that spreads itself through a network and attaches itself to files
What is worms?
A self-replicating malware that spread through a network but doesn’t attach itself to files
What do worms typically do?
Slow networks down
What is a trojan?
A piece of software that appears to perform a useful function but performs malicious actions.
Open a back door for a third party
What is ransomware?
A form of a virus that is self-replicating It encrypts files preventing the user access and will only decrypt files once a ransom is paid
What is spyware?
A malware that monitors and gathers information, such as monitoring internet usage for ads or keylogging to find passwords
What is adware?
Software imbedded with ads
What is a data breach?
A security incident in which sensitive or private data is stolen or views by an unauthorised user
What are Denial-of-Service attacks (DoS)?
When cyber criminals flood a server with requests to overload the system
What are Distributed-Denial-of-Service attacks (DDoS)?
When multiple devices flood a server with requests
What is a zombie?
A computer compromised by malware, typically used for DDoS attacks
What is a brute force attack?
A attack where the cybercriminal tries multiple passwords
What is social engineering?
A set of methods used by cybercriminals to deceive an individual to hand over money or information
What is blagging?
When a hacker invents a fake scenario to convince the victim to give up money or data
Usually they maintain conversation
What is phishing?
When the attack sends a malicious link via email which either steals money or data
What is pharming?
A link that redirects the victim to a fake site
Done by changing the domain name
What is shouldering?
Physically stealing data or passwords by sight
What is eavesdropping?
Physically listening in on personal conversations to get details
What is tailgating?
A physical security breach into secured premises
What is an encryption key?
A piece of information used to encrypt and decrypt data
What is symmetric encryption?
When 1 key is used to encrypt and decrypt messages
But if the key becomes public all messages can be decrypted
What is asymmetric encryption?
When there is a public and private key. Everyone knows the public key but only sender and receiver have private key so it is more secure
What is SQL injection?
It exploits an error in software design, enabling criminals to have access to sensitive data and too change, and delete data
What are code reviews?
A process that helps organisations find vulnerabilities
What is two-factor authentication?
When you are sent a unique code via text or email to confirm your identity
Biometrics
What are misconfigured access rights?
When somebody has access to something they shouldn’t
Why is removable media a security risk?
They may contain malware that could spread through a network to other devices