3.6 Cyber Security Flashcards

1
Q

What is Cyber Security?

A

Cyber security is the different practices processes and technologies to protect networks, computers, programs and data from attacks, damage or unauthorized access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is a process in cyber security

A

Backing up data is a process

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is a practice in cyber security

A

Changes passwords regularly and using strong passwords

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is a technology in cyber security

A

A firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is pharming

A

Pharming is hacking the DNS server so the destination IP address is changed and it sends you to a fake website where a hacker can steal information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is removable media

A

Removable media is USB sticks
They are a problem because they can steal data or infect a computer with malware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is unpatched or outdated software

A

Unpatched software has loopholes that a cybercriminal can use to hack your computer and infect it with malware or log on to it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Why are automatic software updates useful

A

Automatic software updates will automatically patch the loopholes a cyber criminal can use

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is misconfigured access rights

A

When access rights get misconfigured, it can allow unauthorized people getting access to authorized things

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are weak and default passwords

A

Weak passwords are easily guessable or can be brute forced quickly by a cyber criminal
Default passwords are set by the company and are easily guessable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is social engineering

A

Cyber criminals using tricks to get people to share sensitive information, performing actions or compromising security measures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is Blagging

A

Making up an invented scenario to make a targeted victim to share information by using psychological tricks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

what information does blagging use to get the targeted victim to share information

A

Blagging uses personal information from the victim that they get from social media to make it sound more believable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is shoulder surfing

A

Shoulder surfing is looking at a password while it is being entered to be able to get the password and log onto an account

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is Phishing

A

Phishing is when a cyber criminal sends emails to a targeted victim with a link which takes them to a fake website so when they enter their details the cyber criminal will get their username and password and use it on the real website

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

How can you detect Phishing

A

Poor punctuation and grammar, there is a sense of Urgency and if the URL of the link is suspicious

17
Q

What is Malware

A

Malware are executable programs that run on a computer to harm and steal data

18
Q

What is a computer Virus

A

Computer viruses are normally attached to an executable file
They replicate their code in other programs
they infect other computers
they can only spread with the help of a human
they harm the computer by deleting corrupting or modifying files

19
Q

What is a Worm

A

Worms are a standalone software that does not need the help of a human
They slow down networks and computers
They can replicate themselves

20
Q

What is a Trojan Horse

A

Trojans disguise themselves and look like unharmful files
When it is opened, it will harm the computer and give the hacker sensitive information

21
Q

What is Spyware

A

Spyware is installed without the user knowing
It installs a keylogger and reports back to the hacker

22
Q

What is anti-malware software or antiviruses

A

Anti-Malware software will scan for malware and delete them or put them in quarantine

23
Q

What are 5 rules for creating passwords

A

Length
lowercase
uppercase
digits
Special characters

24
Q

What is biometric authentication

A

Measures physical characteristics such as a fingerprint

25
Q

What is email verification

A

When you sign up to a website it will send an email to verify if it is you

26
Q

What is CAPTCHA

A

CAPTCHA is a completely automated public Turing test to tell computers and humans apart
It makes a task that is designed to be impossible for computers but easy for humans
It works by prompting uses to write distorted text or click on images

27
Q

What is penetration testing

A

Trying to find security breaches in their own system and then reporting back to them

28
Q

What are the 4 aims of penetration testing

A

Identify the targets of potential attacks
Identify possible entry points
Attempt to break in
report back findings

29
Q

What are the two types of penetration testing

A

Malicious insider - They work inside the company and have basic credentials
External Hacker - They work outside the company without any knowledge already