3.6 Cyber Security Flashcards

1
Q

Define cyber security

A

Consists of the processes and technologies designed to protect networks and data from attack or unauthorised access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Main purposes of cyber security

A

To protect networks and data from attack or damage or unauthorised access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Cyber security threats
Name 3

A

Social engineering
Malicious code
Pharming
Weak and default passwords
Removable media
Outdated software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Social engineering definition

A

The act of manipulating people so they reveal confidential info

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

3 types of social engineering

A

blagging, shouldering and phishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Define malware

A

A variety of forms of hostile or intrusive software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Security measures to protect against malware

A

Biometric measures
Password systems
CAPTCHA
Using email to confirm identity
Auto software updates

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Penetration testing used for

A

Attempting to gain access to a computer system w/o knowledge of authorised means of access
To stimulate a cyber security attack to expose any weaknesses in the processes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

White box penetration testing

A

To simulate the unauthorised access by a malicious insider who has knowledge and possibly the basic login credentials for target system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Black box penetration testing

A

To simulate an external hacking where attacker has no knowledge of target computer system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Pharming

A

Directing people to fake website to mimic the legitimate one to steal personal info like login credentials

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Forms of malware 3x

A

virus trojan and spyware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

what is blagging?

A

to invent a scenario to engage targeted victim to reveal confidential information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

what is phishing?

A

fraudulently obtaining private information often using email or sms

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

what is shouldering?

A

observing a person entering private information to obtain their credentials

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

what is a computer virus?

A

a program designed to disrupt or damage a computer system, can replicate and spread throughout a network

17
Q

what is a trojan?

A

a program hidden within another application to spy, steal or damage computer system

18
Q

what is a spyware?

A

program designed to monitor and report on activity of a computer system

19
Q

some common cyber security threats?

A

weak and default passwords
removable media
misconfigured access rights
outdated software

20
Q

how does firewalls work?

A

allow specific data into and out of networks
less internet traffic can come through, making the network more secure

21
Q

how do firewalls work?

A

only allow specific data into and out of networks
less internet traffic can come through, making the network more secure

22
Q

how does MAC address filtering work?

A

only the device addresses on the list are allowed to access the network
extra work for the network manager as they must add data every time a new device needs to join the network.