Cyber Security Flashcards

(19 cards)

1
Q

Network security

A

Measures taken to protect network data

from malicious damage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Encryption

A

Conversion of data into cyphertext,
that cannot be understood by
people without the decryption
key.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Compression

A

reducing file size to
allow more data to be
stored on the disk,
increasing transfer speeds.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Archiving

A

The process of storing data that
is not in current use for security,
legal or historical reasons.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Cybersecurity

A

Measures that are
taken to protect computer
systems from cyberattacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Cyberattack (D e a d s acronym including g)

A
An attempt to expose, alter, 
disable, destroy, steal or gain 
unauthorized access to data on 
a computer system or smart 
device.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Malware

A

MALicious softWARE; any kind of computer

software written to enable a cyberattack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Cookies

A

Data downloaded from a
website that allows the website
to identify the computer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Protection against malware ( L.u.u.k.i)

A
  • Install anti-virus software
  • Use a firewall
  • Keep the operating system up to date
  • Use the latest version of browsers
  • Look out for phishing emails.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Shoulder

surfing

A

Using direct observation to get information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

SQL Injection

A

commands that can alter SQL statements and compromise

the security of information in a database.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Denial of

Service (DoS)

A

Making a website or server unavailable to
legitimate users, by filling a system with
fake requests.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Password

attacks

A

Brute force or dictionary attacks to discover

passwords.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

IP Spoofing

A

Changing the IP address of a site so that a
visitor is taken to a fraudulent or spoofed web
page.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Social

engineering

A

Deception such as phishing. Tricking a user

into giving out sensitive information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Network policies (policy)

A

acceptable use policies, rules for using a network, a backup policy for, making regular backups, archiving and
implementing an effective Disaster Recovery Plan

17
Q

Lossless compression

A

uses an algorithm that compresses data

into a form that may be decompressed without any loss of data.

18
Q

Lossy compression.

A

Compressing file size by discarding some of

the data.

19
Q

The compression ratio equation

A

Compression ratio = (/ = divide)

Original file size/Compressed file size