cyber security Flashcards

1
Q

what is malware?

A

malicous/harmful software, that is designed to cause harm or gain unauthorised access computer system

An umbrella term used to refer to a variety of forms of hostile or instructive software.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are some threats to a computer system

A
  • social engineering
  • malware
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is social engineering ?

A

a way of gaining illegal access to data or networks by influencing people (normally employees or large companies)

The art of manipulating people so that they give up confidential information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

what are some forms of social engineering?

A
  • blagging
  • pharming
  • phishing
  • shouldering
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

what are some typical actions of malware?

A
  • deleting or modifying files
  • locking files (ransomware encrypting all the files)
  • unwanted adverts
  • mo
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is Pharming?

A

redirects the user from a websites’s traffic to a fake website , in hope to gain personal information , to access their genuine account

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

How could you prevent pharming?

A
  • anti-malware software , up to date
  • internet browsers using web filters
    *not clicking or links or attachments from unknown users
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What Phishing?

A

A technique if fraudulently obtaining private information, often using email or SMS

emails are sent to the user claiming to be from well known business, asking for bank details

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

How to prevent phishing?

A
  • emails have anti-phishing features
  • you can spot bad grammar , or will ask to redirect to a link
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is shouldering?

A

looking over someone’s shoulder and watching and observing their activity /private information (pin details)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

how can you reduce the risk of shouldering?

A

being discrete (covering the keypad when you enter the pin)
some softwares output astreiks instead of the symbol typed , on the screen

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is Blagging ? (Pretexting)

A

The act of creating and using an inverted scenario to engage a targeted victim in a manner that will increase the chance the victim will divulge information or perform actions that would be unlikely in ordinary circumstances.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

how could you prevent blagging?

A

reduce the risk by using using security measures that cannot be given away,
eg: biometrics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

what is penetration testing?

A

organisations employing specialists to stimulate potential attacks to their system, allowing them to identify their weaknesses in cyber security

The process of attempting to gain access to resources without knowledge of usernames, passwords and other normal means of access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is the difference between white and black penentration testing ?

A

white: when the person or team testing the system has knowledge of possibly basic credentials for the target system, stimulating an attack from inside the system (a malicious insider)

black: when the person of team testing the system has no knowledge of any credentials for the target system, stimulating an attack from outside the system (an external attack)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

what are the different types of malware?

A
  • trojan
  • worms
  • spyware
  • ransomeware
  • viruses
  • adware
17
Q

what is a trojan?

A

appears to be a piece of harmless software, often given away for free, that contains malicious code hidden inside. This only appears once the gifted software is installed.

18
Q

what is spyware?

A

collects the data from one computer system and then sends the details to another person without the user being aware.

data being sent could be thing the user typed, or the sites that are visited, or even where the user is clicking on their screen. Spyware that records what is being typed is known as a keylogger. Keyloggers attempt to find out usernames and passwords by collecting everything that is entered into the system, which allows the hacker to search for personal data.

19
Q

What are viruses?

A

Opening the links activates the virus allowing it to infect a computer and then replicate to affect other devices on the network.

20
Q

What is an anti-virus software?

A

a database of viruses. When opening a file or installing a program .If the virus is similar to the one in the database, it will warn the user.

21
Q

What is adware?

A

legal, in extreme cases ad pop ups that do not go away. (can be solved with ani-virus software)

22
Q

What is ransomeware ?

A

when files will be encrypted and in order to recieve a decrypting key, the hackr will demand a certain amount of money.
probably from suscpitious attachtments.

23
Q

How can removable hardware also a cyber threat?

A

if attcahed to a computer on a network ,all the the comuters could get the virus

24
Q

How is unpatched software a cyber secrutity threat?

A

unpatched sotware= not up to date software and so is more sucesptible to cyber attacks.
‘patching’ updates or fixes a problem or adds new features

reduces vunerability
More outadated software is more easily exploited

25
Q

How do orgainsations keep their networks safe from threats?

A
  • encryption, to prevent wire tapping or packet sniffing
  • anti-malware software
  • firewalls
  • user access levels, stops attacks from within the organisation
  • automatic software updates
  • MAC Address filtering
    *penetration testing (white & black) to find weaknesses and correct
    *strong, regularly changed passwords, against automated software.
26
Q

Describe encryption

A

data translated into cipher text, with the correct key to decipher, data can now be sent over a network securly

27
Q

Describe Firewalls

A

examines all the data leaving and enetring the netwoek, can be software or hardware

28
Q

Describe user access levels, prevnting threats

A

pwople with higher access levels have more access to senetive data , the UAL limits the amount of people who have accesss to the sensitive information.
*Helps prevent attacks from within the organisation

29
Q

Describe MAC filtering

A

makes sure that the only people on the network are trusted employees.
It checks the unique MAC address of each devices that tries to connect to the network, and only allows certain devices to join.

30
Q

What are some types of security measures ?

A
  • email confirmation
  • biometrics
  • CAPTCHA
  • passwords
    *automatic software updates
31
Q

Biometrics

A

✓secure (cannot be given away or manipualted)
✓convienient(don’t have to remeber
X more expensive, needs special hardware

32
Q

CAPTCHA

completly automated public turning ( to tell) computers and humans apart

A

✓prevents programs from automatically doing things (creating user accounts)

33
Q

Whats wrong with putting many security measures in at a time?

A

prevents normal users from being able to use the network easily

34
Q

What is ‘cyber security’?

A

The processes , practices and technologies designed to protect networks, computers, programs and data from attack, damage or unauthorised access

35
Q

Describe the main purposes of cyber security

A