3.6 Cyber Security Flashcards

1
Q

What is Cyber Security?

A

Cyber Security covers the different processes, practices and technologies the protect the following from attacks, damage or unauthorised access:
-Networks
-Computers
-Programs and data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is a computer vulnerable to?

A

Malware (Including viruses)
Social Engineering
Pharming
Misconfigured access rights
Unpatched or outdated software
Removable media

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is a default password?

A

The password that was set at the point of manufacture on a piece of hardware such as a router

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Why are default passwords a potential security risk?

A

Attackers can easily identify and access internet-connected devices that use shared default-passwords

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is meant by user access levels?

A

Each user in an organisation is assigned individual access rights, according to their role. This will limit their ability to carry out certain tasks on the network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What happens if user access levels are not configured correctly?

A

The user will be able to gain access to restricted areas of the network or be able to write to files. This could allow them to view/edit/delete sensitive or confidential information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What happens when a DNS system is hacked?

A

When your computer requests for a website such as barclays.co.uk, it asks a DNS (Domain Name System) server for the IP address.

The DNS Server replies with the IP address

If the server has been hacked then the hacker may have changed the website’s IP to a fake one that looks similar to the legitimate one.

You then enter your login details and the hacker steals them from you.

If this was a fake bank then the hacker can now transfer money to themselves.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is removable media?

A

Removeable media is any storage device that can be inserted and removed from a computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Why is removeable media an issue?

A

Removable media can be used to:
-Steal documents and files from a company
-Introduce malware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is unpatched software?

A

Software that has not been updated to close a security flaw(s) which could potentially be exploited by hackers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is the most important software to update?

A

-OS (Operating System)
-Antivirus/Anti-malware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is social engineering?

A

Manipulating someone to give away personal information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is blagging (or pretexting)?

A

Setting up a scenario that encourages someone to give away personal information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

How is blagging done?

A

It makes use of psychological confidence tricks to get the target to give information or do something they wouldn’t do under normal circumstances

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is a pretext?

A

The scenario which contains personal information (often found on social medial)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is shouldering/shoulder surfing?

A

The ability to get information or passwords by observing as someone types them in.

17
Q

How is phishing done?

A

Emails, texts or phone calls are sent to users commonly pretending to be from a bank or website
The ‘From’ email address may be forged
The message will contain a link to a website that closely resembles the banks website.
The website will then collet personal information such as:
-Usernames
-Passwords
-Credit Card details
-Other personal information

18
Q

What are the key things to look out for in a phishing email?

A
  • Greeting: The phishers don’t know your name so the email is not personalised
  • The sender’s address is often a variation on a genuine address​
  • Forged link: The link looks genuine, but it may not link to the website given.
  • Request for personal information: Genuine organisations never do this​
  • Sense of urgency
    Poor spelling and grammar
19
Q

How can you protect yourself against Blagging?

A

Check the identity of the person you are speaking to
Update social media accounts so that personal information is no longer available

20
Q

How can you protect yourself against Shouldering?

A

Cover PIN/Passwords when entering them
Check over your shoulder to see if anyone is around or if there are any cameras/reflective surfaces
Go somewhere private when making personal phone calls

21
Q

How can you protect yourself against Phishing?

A

Examine the correspondence carefully, checking out the key features of phishing
Don’t click on links
Go directly to an organisation’s website through a browser

22
Q

What is malware?

A

Software that is specifically designed to disrupt, damage or gain unauthorized access to a computer system

23
Q

What is a virus?

A

Computer viruses infect computers
Normally attached to an executable file

They replicate their code in other programs
They infect other computers
They harm the computer by deleting, corrupting or modifying files

They cannot spread without human interaction (i.e. running the program)

24
Q

What is a worm?

A

Worms are very similar to viruses except that they do not require human interaction to travel and execute.
A work takes advantage of file or information transport features on your system, which allows it to travel unaided.
A worm replicates itself in order to spread to other computers.
They might cause no damage to the attacked computers
They may slow down networks and computers

25
Q

What is spyware?

A

Spyware is installed without the user’s knowledge
It aims to spy on user activities by:
-Tracking them as they visit websites
-Installing a keylogger that can read passwords and personal information
Personal data is then sent back to the hacker, often through the use of cookies

26
Q

How does Anti-Malware work?

A

Anti-malware software will detect malware
When a new malware is detected it will report it to the anti-virus company
They verify it is a malware and create a signature of the virus
They then add it to their virus database and tell the computers to run an update.

27
Q

What can viruses do to avoid detection?

A

Viruses can morph which makes it harder to create a signature