Chapter 5 The Internet And Its Uses: Unit 5.3: Cyber security Flashcards

1
Q

List the 8 cyber threats.

A

Brute force attacks
Data interception
Distributed Denial of Service (DDoS) attacks
Hacking
Malware
Phishing
Pharming
Social engineering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Describe anti-spyware.

A

Based on 2 methods:
Rules - Software looks for typical features which are usually associated with spyware thus identifying any potential security issues
File structures - Certain file structures are associated with potential spyware which allows them to be identified by the software
General features of anti-spyware are:
Detect and remove spyware already installed on the device
Prevent a user from downloading spyware
Encrypt files to make the data more secure
Encryption of keyboard strokes to help remove the risk posed by the keylogging aspects of some spyware
Blocks access to a user’s webcam and microphone
Scans for signs that the user’s personal information has been stolen and warns the user if this has happened

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Describe authentication

A

Refers to the ability of a user to prove who they are
There are 3 common factors used in authentication:
Something the user knows
Something the user has
Something that is unique to the user

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Name 2 ways that authentication can be used.

A

Passwords and usernames
Biometrics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are the 4 ways that biometrics can be used for authentication?

A

Fingerprint scans
Retina scans
Face recognition
Voice recognition

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are the benefits and drawbacks of fingerprint scans?

A

BENEFITS:
One of the most developed biometric techniques
Very easy to use
Relatively small storage requirements for the biometric data created

DRAWBACKS:
For some people it is very intrusive, since it is still related to criminal identification
It can make mistakes if the skin is dirty or damaged

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are the benefits and drawbacks of retina scans?

A

BENEFITS:
Very high accuracy
There is no known way to replicate a person’s retina

DRAWBACKS:
It is very intrusive
It can be relatively slow to verify retina scan with stored scans
Very expensive to install and set up

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are the benefits and drawbacks of face recognition?

A

BENEFITS:
Non-intrusive method
Relatively inexpensive technology

DRAWBACKS:
It can be affected by changes in lighting, the person’s hair, change in age, and if the person is wearing glasses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are the benefits and drawbacks of voice recognition?

A

BENEFITS:
Non-intrusive method
Verification takes less than 5 seconds
Relatively inexpensive technology

DRAWBACKS:
A person’s voice can be easily recorded and used for unauthorised access
Low accuracy
An illness can change a person’s voice, making absolute identification difficult or impossible

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Describe two-step verification.

A

Requires 2 methods of authentication to verify who a user is.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Describe firewalls.

A

Can be either software or hardware
Sits between a user’s computer and an external network and filters information in and out of the computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are the firewall’s main tasks?

A

To examine the ‘traffic’ between the user’s computer and a public network
Checks whether incoming or outgoing data meets a given set of criteria
If the data fails the criteria, the firewall will block the ‘traffic’
Can be used to log all incoming and outgoing ‘traffic’
Criteria can be set so that the firewall prevents access to certain undesirable sites
Possible for firewalls to help prevent viruses or hackers entering the user’s computer
The user is warned if some software on their system is trying to access an external data source

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Give examples of things that a firewall cannot prevent.

A

It cannot prevent individuals, on internal networks, using their own hardware devices
Employee misconduct or carelessness
Users on stand-alone computers can choose to disable their firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Define proxy server

A

Acts as an intermediate between the user and a web server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are the features of a proxy server?

A

Allows internet traffic to be filtered; can block access to a website if necessary
Keeps user’s IP addresses secret which improves security
If the internet traffic is valid, access to the web server is allowed
If the internet traffic is invalid, access to the web server is denied
Can block requests from certain IP addresses
Prevents direct access to a web server by sitting between the user and the web server
If an attack is launched, it hits the proxy server instead - helps to prevent hacking, DoS, etc.
Used to direct invalid traffic away from web servers which gives additional protection
By using cache, it is possible to speed up access to information/data from a website
Proxy servers can also act as firewalls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Describe privacy settings

A

Controls available on web browsers, social networks and other sites that are designed to limit who can access and see a user’s personal profile
Can refer to:
A ‘do not track’ setting - stops certain websites from storing and collecting browsing data
A check to see if payment methods have been saved on websites
Safer browsing
Web browser privacy options
Web advertising opt-outs
Apps

17
Q

Define SSL

A

Secure sockets layer - Type of protocol that is used by computers to communicate with each other across a network - allows data to be sent and received securely over the internet

18
Q

Describe the process when a user wants to access a secure website and receive and send data to it.

A

The user’s browser sends a message so that it can connect with the required website which is secured by SSL
The browser then requests that the web server identifies itself
The web server responds by sending a copy of its SSL certificate to the user’s browser
If the browser can authenticate the SSL certificate, it sends a message back to the web server to allow communication to begin
Once this message is received, the web server acknowledges the web browser, and the SSL-encrypted two-way data transfer begins

19
Q

Define SSL certificate

A

Form of digital certificate which is used to authenticate a website

20
Q

Name 9 examples of where SSL would be used.

A

Online banking and all online financial transactions
Online shopping/commerce
When sending software out to a restricted list of users
Sending and receiving emails
Using cloud storage facilities
Intranets and extranets
Voice over Internet Protocols (VoIP) when carrying out video chatting and/or audio chatting over the internet
Instant messaging
When making use of a social networking site