cyber security Flashcards

1
Q

Hacking

A

illegally gaining access to a computer system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Cracking

A

illegally changing source code of a program so that it can be exploited for another use

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

6 types of malware

A

worms, viruses, ransomware, adware, trojan horse, and spyware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Spyware

A

software that gathers information by monitoring; the gathered info is sent back to the person who sent the software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Viruses

A

program(or program code) that self-replicate and delete/corrupt files, or causing the computer to malfunction

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Phishing

A

a legitimate-looking email sent to a user by a cybercriminal; redirects user to fake website; used to try and steal financial details

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Pharming

A

malicious code stored on a computer; redirects user to fake website to steal users data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Brute force attacks

A

a hacker systematically trying all combinations of letters, numbers and characters to ‘crack’ user’s password

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

DNS cache poisoning

A

used with pharming; changes the IP address sent by DNS server to fake website

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Trojan horse

A

disguised as legitimate software but with malicious intentions; often arrive as an email attachment; need to be executed to run and infect

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Trojan horse often act as ________ or _______ once installed.

A

spyware, ransomware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Adware

A

software that floods user with unwanted adverts; usually in the form of pop-ups; redirects user’s browser to different websites

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Worms

A

malware that self-replicates; spread throughout networks - rely on poor network security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Unlike a virus, _______ don’t need an active open program to cause damage or user to initiate them

A

worms

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Social engineering

A

Cybercriminal manipulates user to drop usual security procedures; no hacking involved

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

5 main types of social engineering

A

instant messaging; scareware(pop up claiming user infected); phishing; baiting(cybercriminal leaves an infecting USB stick); phone calls(fake IT call center)

17
Q

DDoS Attacks stand for

A

Distributed Denial of Service Attacks

18
Q

DDoS Attacks

A

designed to flood a server with useless traffic(large number of requests); server come to a stop trying to deal with the traffic; spam originates from many different computers in different locations

19
Q

_________ prevent users gaining access to the web server.

A

DDoS Attacks

20
Q

Data Interception

A

Stealing data by tapping into wired/wireless comm link; intercepted data sent back to the hacker

21
Q

Data interception can be carried out using _____________ and ____________________.

A

packet sniffer, wardriving/access point mapping

22
Q

Causes of data loss

A

accidental deletion; malicious virus; hardware/software failure; natural disaster

23
Q

Prevention of data loss

A

set data to read only; use correct shut down procedures/procedures when removing portable storage devices

24
Q

Antivirus

A

compares virus signature against a database of known virus signatures

24
Q

Firewalls

A

prevent unauthorized access; acts as a FILTER for incoming/outgoing data; checks data meets criteria; logs incoming and outgoing traffic; blocks access to specified IP addresses

25
Q

Proxy server

A

keeps user IP address secret; prevents direct access to a web server; filters traffic; blocks selected IP addresses

26
Q

Proxy server speeds up traffic using ________.

A

cache

27
Q

Proxy server helps prevent hacking of a _________.

A

web server