5.3+ Cyber Security(SOLUTIONS) Flashcards

(56 cards)

1
Q

What are access levels?

A

Different levels of access are given to different users using a username and a password.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Why are access levels important in databases?

A

To control who can read, write, or delete data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Where else are access levels used?

A

Social networking sites (e.g., Facebook).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are the four access levels on social networks

A
  • Public
  • Friends
  • Custom
  • Data owner
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is public access?

A

Public access is data that anyone from the general public can access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is Friends Access?

A

Friends Access is only for people marked as friends, who can see the data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is custom access?

A

The user chooses which friends can see specific content.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is data owner access?

A

Data is only visible to the owner.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

How do social networks control access instead of passwords?

A

Social networks control access instead of passwords by using privacy settings

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are the most common types of anti-malware?

A

Anti-virus and anti-spyware.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What does anti-virus software do?

A

Scans files and detects viruses.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Name four features of anti-virus software.

A
  • Runs in the background
  • Scheduled scans
  • Quarantine viruses
  • Deletes viruses
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

When should anti-virus software check for viruses?

A
  • On system startup (boot sector viruses)
  • When external storage is connected
  • When files or web pages are accessed/downloaded
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What does anti-spyware software do?

A

Detects and removes spyware.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

How does anti-spyware protect users?

A

Anti-spyware checks data before download and warns or stops the download.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is authentication?

A

Authentication is the process of checking if a user is who they claim to be.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Why is authentication used?

A

Authentication is used to prevent unauthorized access to data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Name three authentication methods

A
  • Username and password
    -Biometrics
  • Two-step verification
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Name four ways to prevent confidential data from being viewed

A
  • Encryption
  • Passwords
  • Biometrics
  • Two-step verification
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

How do usernames and passwords work?

A

Usernames and passwords are checked against a secure file to allow or deny access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Why should passwords be strong?

A

Passwords are strong to prevent unauthorised access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

How should passwords be protected?

A
  • Use anti-spyware
  • Change regularly
  • Use strong passwords
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What makes a strong password?

A
  • Capital letter
  • Number
  • Special character (@, *, &)
24
Q

What happens when a user forgets a password?

A

When a user forgets their password, a reset link is sent to their email.

25
What are biometrics based on?
Unique human characteristics.
26
Why are biometrics secure?
Biometrics are secure as they cannot be guessed or shared.
27
Why do smartphones use biometrics?
- Extra security - Faster access - No need to remember passwords
28
Name four biometric methods.
- Fingerprint - Retina scan - Face recognition - Voice recognition
29
How does fingerprint scanning work?
Fingerprint scanning compares ridges and valleys with stored fingerprints
30
Give one benefit of fingerprint scanning.
Unique and difficult to replicate.
31
Give one drawback of fingerprint scanning
Expensive or affected by finger injuries.
32
How does a retina scan work?
A retina scan uses infrared to scan blood vessels in the retina.
33
Why is retina scanning secure?
Blood vessel patterns cannot be duplicated.
34
How does face recognition work?
Face recognition compares facial features with stored data.
35
How does voice recognition work?
Voice recognition compares voice wave patterns with stored samples.
36
What is a text-based password?
Characters typed on a keyboard
37
What is a biometric password?
A stored physical measurement.
38
Give two differences between them.
- Text passwords are easier to hack - Biometric passwords are unique and cannot be shared
39
What is two-step verification?
- Logging in using a password plus a code sent to a device.
40
Why is two-step verification secure?
The hacker needs access to the user’s device.
41
What are automatic software updates?
Automatic software updates keep software up to date using patches.
42
Why are Automatic Software updates important?
- Fix security vulnerabilities - Remove bugs - Improve performance
43
Why should spelling and tone be checked in emails?
Scammers often use poor spelling and an urgent tone.
44
What is typo-squatting?
Using similar domain names to trick users (e.g. gougle.com).
45
Give two signs of a phishing email.
- Suspicious links - Fake email address or domain
46
What is a firewall?
Software or hardware that monitors network traffic.
47
What does a firewall do?
- Monitors traffic - Uses rules (blacklist/whitelist) - Blocks suspicious traffic
48
One limitation of firewalls?
- Cannot stop all malicious traffic.
49
What is a proxy server?
A proxy server is an intermediary between the user and the web server.
50
How does a proxy server improve security?
Attacks hit the proxy instead of the web server
51
What are privacy settings?
Privacy settings control that limit who can see user data.
52
Give one example of a privacy setting.
‘Do not track’ option.
53
What is SSL?
SSL(Secure Socket Layer) is a protocol for secure data transmission.
54
How does SSL protect data?
SSL protects data by encrypting data using keys.
55
How can users tell if a website uses SSL?
- HTTPS - Locked padlock - Valid SSL certificate
56
Give two uses of SSL.
- Online banking - Online shopping