What is Cyber Security ? Flashcards

1
Q

What is Cyber Security ?

A

Is the field that deal with enacting counter measures against attacks, disruptions and thefts against and throught technological systems, via the means of ‘Hacking’.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is Hacking?

A

Gaining an unauthorized access to a computer, system or a network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Ways of performing Hacking?

A

Bypassing the security methods in place , another method is using an algorhytm and cracking the security between you and the target.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Types of Hackers?

A

There is a Black Hat Hacker, White Hat Hacker and Grey Hat Hacker.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is a Black Hat Hacker?

A

Malicious Intent, could be for theft, just to have fun, diruptiveness , ransomware.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is a White Hacker?

A

Hired by an organization and hacks into their own systems to find flaws and ways to improve security,

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is a Grey Hat Hacker?

A

Does everything the white hat hacker without consent but has no malice unlike the black hat hacker. This is in a grey area as it is not always illegal or legal itself.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is Ethical Hacking?

A

Ethical Hacking is the authorized and legal process of finding out vulnerabilities, threats and exploits in a system or computer network through penetration testing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is penetration testing?

A

Use various means such as algorhytms, existing exploits to try and bypass or crack the network to find vulnerabilities. As a white hat hacker you make a report with all the information gathered and send it to your employer so they can better protect themselves by fixing found vulnerabilities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Common Hacks found Today?

A

Malware, Phishing, SQL Injection, Cross Site Scripting, Denial Of Service Attack, Man In the Middle Attack.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Forms of Malware?

A

Malware can take the form of viruses, trojan horses pretending to be something else on our computers and could potentially be stealing key information, unwanted installed software on your device.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is Phishing?

A

Links pretending to be something else to trick you into giving your personal and private information such as bank account info, social media etc… In many cases a hacker might redirect you over to the correct page so you never suspect what has happened in the first place.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is SQL Injection?

A

When a hacker gets direct access to your database and can place the correct SQL statement into it he/she can query any kind of information such as usernames, passwords, sales date, and private customer information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is Cross Site Scripting?

A

Hacks that are not running on the target system , but directly to you due to hackers using javascript to their advantage by writing their malicious code into the sites existing code. Best practices to avoid this is by not using web pages that are not certified or secure (HTTPS:)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is Denial of Service Attack?

A

The hacked will virtualize a number of requests greater than your server can handle and send them all at once and if the server is not properly equipped to handle it the server will crash and will result in loss of business and repair costs. Any other user who will be trying to use the website will not be able to.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is Man in the Middle Attack?

A

It is essentially taking messages for example in the middle of transfer and decrypting them therefor finding their real meaning. Especially dangerous for governments and businesses.

17
Q

Why do organizations need Ethical hackers?

A

Hiring ethical hackers can save millions, if not billing of dolars for these organizations, and keep businesses securely afloat with user privacy under complete lockdown.

18
Q

How to get a job as an EH?

A

Whether you are extremely skilled or an amateur the best way to get a job as an EH is to get an industry accepted certification which proves you have already been tested as a candidate.

19
Q

Which Certification is the most recommended for the EH Job?

A

Certified Ethical Hacker Certification (CEH), is an industry-accepted accolade by the EC-Council obtained by demonstrating knowledge of key hacking skills to assess security and vulnerabilities in target system, in a lawful and legitimate manner.

20
Q

What does the CEH Certify?

A

The candidate knows how to approach the target with a mindset of a skilled hacker and take measures to prevent it from happening.

The candidate knows how to detect vulnerabilities in the target system.

The candidate is proficient at utilizing the hacking-related tools in the exam syllabus.