User Security and Cyber Security Flashcards
Define social engineering
manipulating people to breaking security procedures
Name 5 types of social engineering (5)
instant messaging
scareware
emails/phishing scams
baiting
phone calls
Purpose of access levels
different levels of access for different people
What do user accounts control
user access rights
2 types of anti-malware
anti-virus
anti-spyware
How anti-spyware remove spyware using the rules method (2)
looks for spyware features
identifies potential security issues
How does anti-spyware remove spyware using the file structure method (2)
looks for spyware file structures
removes them
Function of passwords
restrict access to data/systems
Examples of biometrics (4)
fingerprint scans
retina scans
face recognition
voice recognition
Define 2 step verification (2)
authentication
uses 2 methods to verify users
When is 2 step verification used
online purchases
Define automatic software updates (2)
updating software on user computer
improves software performance
Define brute force attacks
trying different combinations of letters/numbers/symbols until password found
How to prevent brute force attacks (2)
locking device once certain number of incorrect passwords guessed
strong password
Define data interception (2)
stealing data by tapping into wired/wireless communication link
intent to obtain confidential information
Solution to data interception (2)
encryption
firewall
What does DDoS stand for
distributed denial of service
Define a DDoS attack (2)
prevents users from accessing part of network
floods network with useless spam traffic
How DDoS attacks work (2)
attacker sends thousands of requests
website cannot service legitimate user’s request
Define hacking
gaining illegal access to computer system without user permission
Features of viruses (4)
program that replicates
corrupt files
cause computer to malfunction
need active host program/infected OS to work
Features of worms (3)
standalone virus
replicates and spreads to other computers
arrive as message attachment
Features of trojan horse (3)
program disguised as genuine software
carries harm to user computer system
will give cybercriminals user personal info
How do trojan horses arrive as (2)
email attachtement
website download
features of spyware (3)
software
gathers info based on user’s actions
sent info to cybercriminal
Features of adware
floods user with unwanted advertising
Features of ransomware (2)
encrypt data on user computer
user pays cybercriminal to send decryption key
Features of phishing (3)
cybercriminal send legitimate looking email
link in email sends user to fake website
trick user to enter personal data to website
Features of pharming (3)
malicious code on user computer or infected website
code directs user to fake website
cybercriminal gains user personal info
What does DNS cache poisoning do (2)
changes IP values of real websites to fake websites
redirects user to fake website
Define a biometric password
password which uses features that belong to human