2.3.2 Cyber Security Flashcards

1
Q

What are the legal and professional responsibilities in identifying threats

A

Preventing and mitigating damaged caused by malicious or deliberate attacks require a multi-layered approach

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Types of advanced viruses/scams

A

Brute force attacks
Cross-site Scripting
Cross-site request forgery
Buffer overload
Remote code execution
Directory traversal

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Types of normal viruses/scams

A

SQL Injection
Man in the middle attacks
DDos attack
Social engineering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Types of Cyber defences

A

Firewalls
Encryption
Access control
Anti-virus software
Patches and updates
Backups
User education
Network segmentation
VPN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Types of Hackers

A

Black hat - Illegal (unauthorised access with malicious intent)

White Hat - Legal (Hired to try to hack businesses)

Grey Hat - Similar to Black hat but without malicious intent

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Types of firm Security measures

A

Encryption
Firewall
Anti-virus software
Hierarchical access levels

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Define cryptography

A

The practice of securing communication and data through the use of algorithms

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Techniques of cryptography

A

Symmetric key
Asymmetric key
Hash junctions
Digital signatures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Types of Biometrics

A

Fingerprint, facial, voice, eye(iris), signature recognition and behavioural biometrics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Benefits of biometrics

A

Increased security
Convenience
Reduced fraud
Increased accuracy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Drawbacks of biometrics

A

Privacy concerns
Technical limitations
Cost
Bias and discrimination

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is a tracert

A

A network diagnostic pool used to track the path taken by data packets from a source computer to another computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is IP address Masking

A

the process of hiding or changing the real IP address of
a device or network to appear as if it originates from
a different location or device.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is a “whois”

A

A protocol and database system that stores information about registered domain names and the associated organisations and individuals.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly