07 - Cyber Security Flashcards

(35 cards)

1
Q

define cybersecurity

A

processes or technologies designed to protect networks/computers or programs from attack, damage, or unauthorised access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

what is a brute force attack (passwords)

A

guessing the password manually until you get access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

why is social engineering preferred by cyber criminals compared to hacking a system?

A

as it is easier, and people are the ‘weakest’ link

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

define a cyber threat

A

any threat to a computer system from an internet source

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

define hacktivism

A

the act of hacking or breaking into a computer system for politically or socially motivated purposes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

what is the aim of hacktivists?

A
  • to promote their view of thinking/cause

- to challenge organisations/companies who are against their pov

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

define social engineering

A

the art of manipulating individuals to break security procedures to give information away

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

what is blagging?

A

creating an invented scenario to engage targeted victim to directly give away information (passwords)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

give an example of blagging

A

an employee is called and asked for login details and password to fix a security bug, they give it away, system is hacked

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

what is phishing?

A

sending emails (pretending to be a genuine company), to gain personal details

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

what are signs of a phishing email?

A
  • spelling errors/ bad grammar
  • informal writing
  • impersonal (dear customer)
  • deadline (if you don’t do this then account closes)
  • email is unrealistic
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

what is pharming?

A

when your computer has been infected so it changes valid hyperlinks to malicious websites

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

how can you be directed to a pharming website?

A
  • modifying certain files

- hacking domain name server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

what is shouldering?

A

direct observation of a user entering their security details (passwords/pins)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

what is another word for shouldering?

A

shoulder surfing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

define malware

A

software that is designed to disrupt or harm a user’s computer

17
Q

what does a virus do?

A
  • self-replicates
  • cause damage to computer system by corrupting data
  • or using all available memory
18
Q

what does a trojan horse do?

A
  • disguised as harmless file/download
  • malware loaded with download
  • attack performed once downloaded
19
Q

describe spyware

A

(computer program)

  • gathers data about people without knowledge
  • records key pressers on computer (can gather passwords/ usernames)
20
Q

describe adware

A
  • inject adverts to websites/ programs on computer
  • aim that the creator would generate advertising revenue
  • not usually too bad (but can contain worse malware like viruses and spyware)
21
Q

how do you prevent threats from downloaded software?

A
  • have anti-virus software

- only download from a reputable source

22
Q

what is penetration testing?

A

finding out whether there are any security vulnerabilities in a network or system by stimulating potential attacks and reporting vulnerabilities

23
Q

which kind of penetration testing has knowledge of the internals of the system?

A

white box testing

24
Q

what is the role of white box testing?

A

to stimulate an attack from someone with detailed insider knowledge of the system (rogue employee)

25
what is the aim of black box testing?
go stimulate a full-on cyber warfare attack
26
what kind of penetration testing does not have any knowledge of the system?
black box testing
27
what is black-box testing used to stimulate?
full on cyberwardare attack (flood servers with more requests they can handle)
28
what is a denial of service attack?
flooding the servers with more requests they can handle
29
state examples of biometric authentication
fingerprints, iris scanning, facial recognition,
30
how can an authentication system add extra security?
two-factor authentication
31
what are email confirmations used for?
- ensure person signed up is using a valid email address | - prevent unnecessary strain on the computer's servers (mass signing up)
32
what is CAPTCHA for?
- stop bots from automatically signing up to a website and overloading the server
33
what is an alternative to penetration testing?
automatic software updates (software is updated every time a new vulnerability is detected) - instead of right at the start
34
what is the point of a virus?
- slow down computer | - consume memory usage
35
what is the aim of spyware?
steal your passwords