User Security and Cyber Security Flashcards
Define social engineering
manipulating people to breaking security procedures
Name 5 types of social engineering (5)
instant messaging
scareware
emails/phishing scams
baiting
phone calls
Purpose of access levels
different levels of access for different people
What do user accounts control
user access rights
2 types of anti-malware
anti-virus
anti-spyware
How anti-spyware remove spyware using the rules method (2)
looks for spyware features
identifies potential security issues
How does anti-spyware remove spyware using the file structure method (2)
looks for spyware file structures
removes them
Function of passwords
restrict access to data/systems
Examples of biometrics (4)
fingerprint scans
retina scans
face recognition
voice recognition
Define 2 step verification (2)
authentication
uses 2 methods to verify users
When is 2 step verification used
online purchases
Define automatic software updates (2)
updating software on user computer
improves software performance
Define brute force attacks
trying different combinations of letters/numbers/symbols until password found
How to prevent brute force attacks (2)
locking device once certain number of incorrect passwords guessed
strong password
Define data interception (2)
stealing data by tapping into wired/wireless communication link
intent to obtain confidential information