Cybersecurity Flashcards

1
Q

What are ethical/white-hat hackers?

A

Ethical or white-hat hackers are paid to try and break into networks or databases to identify any security flaws.

For example, the police would have white-hat hackers to catch black-hat hackers or other types of cyber criminal.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the most commonly stolen forms of data?

A

Name

Address

Email address

Phone number

Passwords

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What can hackers do with your name and address?

A

Hackers could apply for loans and credit cards in your name or use this information to transfer money illegally.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What can hackers do with your email address?

A

You’ll be sent spam and other forms of unwanted marketing emails

You may be the target of phishing attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What can happen if a scammer gets hold of your phone number?

A

You’ll likely be receiving a variety of annoying calls from fake insurance companies, banks or even the government to try and convince you that you owe a large sum of money.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What can happen if a hacker gets hold of your password?

A

They can access your accounts e.g banking, shopping, email or social media.

As well as using your identity to access your accounts and funds, a scammer might also use it to cloak themselves and commit other cyber crimes pretending to be you and making it harder to track the source of the attack back to them.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What passwords are the hardest to crack?

A

The longest passwords are the safest.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are the advantages of fingerprint scanners?

A

Unique to everyone

Hard to fake

Change very little over the course of your life

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are the disadvantages of fingerprint scanners?

A

Someone could steal your biometrics.

If you hurt your finger, it won’t recognise it.

System failures may block access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are the disadvantages to the face scanner?

A

Not perfect

Some people may have similar faces.

If you get cosmetic surgery, it won’t recognise you

Poor camera quality may hinder its ability to recognise you

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are the advantages of facial scanners?

A

You can unlock your smartphone with a glance

Completely contact-free

Makes it easier to track down thieves or criminals

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are the advantages to voice recognition?

A

Time-saving
Easy to use
Non-contact

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are the disadvantages to voice recognition?

A

Voices can change overtime
Not always accurate if someone has a similar voice
High false negative rate and false positive rate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is 2FA?

A

2FA is requires you to log in using a username and password but then to use an additional method to prove that you are a genuine user.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are examples of 2FA?

A

• Texting a code to your mobile phone that you need to complete the login process
• Emailing a link that you must click on to complete the login process
• Asking for a code from an app like Google Authenticator to complete the login process

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is a black-hat hacker?

A

A black hat hacker is someone who has extensive knowledge about penetration testing, but they use this knowledge to hack into systems with malicious intent.

Black hat hackers are the people who would write malware, which is a method used to gain access to computer systems and networks.

17
Q

What is a grey-hat hacker?

A

Grey hat hackers are a blend of both black hat and white hat activities. Often, grey hat hackers will look for vulnerabilities in a system without the owner’s permission or knowledge. If issues are found, they will report them to the owner, sometimes requesting a small fee to fix the issue.

18
Q

Is grey-hat hacking still considered illegal?

A

This type of hacking is still considered illegal because the hacker did not receive permission from the owner prior to attempting to attack the system.

19
Q

What can changing file extensions be used for?

A

It can be a way to hide the real type of file from people looking for specific data. It does not change the form of the file.

20
Q

Example: What is mp3?

A

Sound file

21
Q

What does a reverse image search let you do?

A

It lets you submit a picture onto a search engine and it gives you more information on the picture.

22
Q

What kind of information exists within saved files?

A

When files are saved, they can store information about the creator, the date and time of saving and, depending on the file type, other types of information e.g. Resolution of an image, sound quality of an audio file etc.

23
Q

What is EXIF data?

A

EXIF (exchangeable image file) is a format standard for storing information in digital photography JPEG image files and is data stored alongside the image.

24
Q

What kind of data does EXIF store?

A

While some data is about the settings of the camera, it will also have time, date and often GPS data included meaning that it can be used in digital forensics to find out more about the picture.

25
Q

What can digital forensics be used for?

A

It can be used for investigations that occur in the aftermath of a criminal case or cyber security attack.

26
Q

What are hashes?

A

Hashes are the products of cryptographic algorithms, performed on the contents of a file, designed to produce a string of characters unique to that file.

27
Q

What is a hash file?

A

A hash file is shown alongside a file, which verifies the integrity of the file using the hash unique to it and seeing if it matches

28
Q

What is steganography?

A

Steganography is the practice of hiding a secret message inside of something that is not secret.

29
Q

What are examples of steganography?

A

Embedding a secret piece of text inside of a picture
Hiding a secret message or script inside of a Word or Excel document.

30
Q

What is the purpose of steganography?

A

The purpose of steganography is to conceal and deceive. It is a form of covert communication and can involve the use of any medium to hide messages.

31
Q

What are ciphers used for?

A

To encode data, making it unreadable unless you know how to decipher it.

32
Q

What is a penetration test?

A

A Penetration Test (Pen Test) is an authorised simulated cyber attack on a system to check how secure it is from real attacks to then improve security.

33
Q

What is reconnaissance?

A

Finding out information about a target

34
Q

What is passive reconnaissance?

A

Seeing what information you can find out online about a target without contacting them.

35
Q

What is active reconnaissance?

A

Seeing what information you can find out about a target by checking systems or contacting to find out about them.

36
Q

What are examples of passive reconnaissance?

A

Investigating premises

Online tools

37
Q

What is an example of active reconnaissance?

A

Pinging a system