3.6 Flashcards

1
Q

Define Cyber Security.

A

Cyber security consists of the processes, practices and technologies designed to protect networks, computers, programs and data from attack, damage or unauthorised access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is removable media?

A

Memory sticks and removable hard drives can pose two major threats to an organisation; data theft and virus infection.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is pharming?(2)

A

Pharming is a technique that redirects a website’s traffic to another fake site by putting code on either your hard drive or on the actual server itself.
When you type in a genuine website address pharming redirects you to a fake website.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are weak passwords?(2)

A

A weak password is one that is easily guessed, such as a word from a dictionary or a piece of personal data that can easily be found out about the user.
A strong password is one that has an uppercase and lowercase letter, number(s), and special character.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are misconfigured access rights?

A

In organisations, user names are used to identify the access rights for each user. If these access rights are not carefully managed, they may create barriers to legitimate access or conversely allow some people into areas which they shouldn’t have access to.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is unpatched or outdated software?

A

If software is outdated because users may not automatically update, there could be vulnerabilities in the code that means it will be easy to hack into.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Define social engineering?(2)

A

Social engineering is the art of manipulating people so they divulge personal information such as passwords of bank account details.
Social engineering includes the following techniques: blagging, phishing, shouldering.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is blagging?(3)

A

Blagging is the act of knowingly obtaining or disclosing personal data or information without the consent of the controller.
For example, an employee could trick a colleague to tell them private information, saying that the need it in order to install something on their computer.
To prevent blagging, companies should provide security training to their employees so that they don’t fall for these tricks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is phishing?(2)

A

Phishing emails are designed to steal money, an identity or login details. It’s most common they come as an email or SMS text inviting you to click a link.
This can be prevented by always being aware of links in emails, often the emails may also have simple spelling and grammar mistakes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is shouldering?

A

Shouldering or shoulder surfing uses direct observation techniques to gain information such as passwords or data. It is most common as someone looking over your shoulder while you type in your PIN.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Define malware.

A

Malware is the term used to refer to a variety of forms of hostile or intrusive software.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Define computer virus.(2)

A

A computer virus is a program that is installed on a computer without your knowledge or permission with the purpose of doing harm.
Viruses include instructions to replicate between and on a computer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is Spyware?(2)

A

Spyware is software that gathers info about a person or organisation without their knowledge.
It is used to collect personal info, as well as change computer settings, or browser settings.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is a Trojan?(2)

A

A Trojan is a program with masks itself as having a different purpose than it actually has. It is most commonly spread via email.
Trojans can cause crashes, spread malware, corrupt data or access sensitive info.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is network forensics?(2)

A

Network forensics involves capturing, storing and analysing network events by using special software.
Network forensics can reveal who communicated with whom, when, how and how often.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is penetration testing?(4)

A

Penetration testing is used to find any security weaknesses in a system.
The strategy is to gather info about the target of possible attacks, identify possibly entry points and attempt to break in.
A black box penetration test is where testers are given little to no info about the network prior to the test. This targets email servers, web servers or firewalls.
A white box penetration test is where tester is given basic info about the network prior to the test. This includes IP address, network protocols and even passwords.

17
Q

What is Anti-malware software?(3)

A

Anti-Malware prevents harmful programs from being installed.
Prevents important files, such as the operating system, from being changed or deleted.
If a virus does manage to install itself, software will detect and remove it.

18
Q

What are automatic software updates?

A

Automatically updating software will remove any harmful code planted in the software by a hacker.

19
Q

What are biometric methods?

A

Biometric methods prove to systems that people are who they claim to be. These may include a fingerprint scan, voice pattern sample or retinal scan.

20
Q

What is CAPTCHA?

A

CAPTCHA is Completely Automated Public Turing test to tell Computers and Humans Apart.

21
Q

What is a Keylogger?

A

Keyloggers