User Security and Cyber Security Flashcards

You may prefer our related Brainscape-certified flashcards:
1
Q

Define social engineering

A

manipulating people to breaking security procedures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Name 5 types of social engineering (5)

A

instant messaging

scareware

emails/phishing scams

baiting

phone calls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Purpose of access levels

A

different levels of access for different people

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What do user accounts control

A

user access rights

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

2 types of anti-malware

A

anti-virus

anti-spyware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

How anti-spyware remove spyware using the rules method (2)

A

looks for spyware features

identifies potential security issues

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

How does anti-spyware remove spyware using the file structure method (2)

A

looks for spyware file structures

removes them

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Function of passwords

A

restrict access to data/systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Examples of biometrics (4)

A

fingerprint scans

retina scans

face recognition

voice recognition

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Define 2 step verification (2)

A

authentication

uses 2 methods to verify users

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

When is 2 step verification used

A

online purchases

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Define automatic software updates (2)

A

updating software on user computer

improves software performance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Define brute force attacks

A

trying different combinations of letters/numbers/symbols until password found

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

How to prevent brute force attacks (2)

A

locking device once certain number of incorrect passwords guessed

strong password

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Define data interception (2)

A

stealing data by tapping into wired/wireless communication link

intent to obtain confidential information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Solution to data interception (2)

A

encryption

firewall

17
Q

What does DDoS stand for

A

distributed denial of service

18
Q

Define a DDoS attack (2)

A

prevents users from accessing part of network

floods network with useless spam traffic

19
Q

How DDoS attacks work (2)

A

attacker sends thousands of requests

website cannot service legitimate user’s request

20
Q

Define hacking

A

gaining illegal access to computer system without user permission

21
Q

Features of viruses (4)

A

program that replicates

corrupt files

cause computer to malfunction

need active host program/infected OS to work

22
Q

Features of worms (3)

A

standalone virus

replicates and spreads to other computers

arrive as message attachment

23
Q

Features of trojan horse (3)

A

program disguised as genuine software

carries harm to user computer system

will give cybercriminals user personal info

24
Q

How do trojan horses arrive as (2)

A

email attachtement

website download

25
Q

features of spyware (3)

A

software

gathers info based on user’s actions

sent info to cybercriminal

26
Q

Features of adware

A

floods user with unwanted advertising

27
Q

Features of ransomware (2)

A

encrypt data on user computer

user pays cybercriminal to send decryption key

28
Q

Features of phishing (3)

A

cybercriminal send legitimate looking email

link in email sends user to fake website

trick user to enter personal data to website

29
Q

Features of pharming (3)

A

malicious code on user computer or infected website

code directs user to fake website

cybercriminal gains user personal info

30
Q

What does DNS cache poisoning do (2)

A

changes IP values of real websites to fake websites

redirects user to fake website

31
Q

Define a biometric password

A

password which uses features that belong to human