Cyber Security Flashcards

1
Q

What is hacking?

A

Automated or manual attempts to gain unauthorised access to programs or data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

How to protect against hacking?

A

Firewall to block access by unauthorised devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is a brute force attack?

A

Automated or manual attempts to gain unauthorised access to secure areas by trying all possible password/key combinations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

How to protect against brute force attacks?

A

Strong passwords
Limited attempts allowed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is data interception and theft?

A

Data may be intercepted during transmission, but physical theft can occur where storage devices or data files are left insecurely

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

How to protect against data interception and theft?

A

Encryption
Passwords
Physical locks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is spyware?

A

Software that hides on your computer and records your activities to send back to a third-party for analysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

How to protect against spyware?

A

Anti-malware
Anti-spyware software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is phishing?

A

Phishing emails redirect a user to a fake website where they trick the reader into divulging confidential information such as passwords that can be used fraudulently

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

How to protect against phishing?

A

Network policy
Firewall
User awareness of phishing ‘clues’

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is pharming?

A

Sends the user to a fake website that looks like the real thing. The user types in a legitimate address and is redirected to a fake website

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

How to protect against pharming?

A

Checking the URL
Making sure the site says HTTPS, not HTTP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is malware?

A

Malicious software written to cause inconvenience or damage to programs or data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is a virus?

A

A program that is installed on a computer without the user’s knowledge or permission with the intent of doing harm.

It includes instructions to replicate automatically on a computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is a worm?

A

A program that is similar to a virus, except it cannot self-replicate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What does anti-virus software do?

A

Software that runs on a computer checking all files for known viruses
It must be updated regularly

17
Q

What is a Trojan horse?

A

A program that masquerades as having one legitimate purpose, but it actually has another

18
Q

How does a Trojan horse work?

A

A link is spread by email

The user is invited to click on a link for an everyday purpose

This link then executes a program which gives the controller unauthorised access to the computer

19
Q

What is ransomware?

A

A form of malware that encrypts a victim’s files.

20
Q

How does ransomware work?

A

A ransom is demanded from the attacker in return for instructions on how to decrypt the files

21
Q

What is adware?

A

A malware that displays onscreen advertisements. It is not always dangerous, but could redirect the browser to an unsafe site

22
Q

What does DDoS stand for?

A

Distributed Denial of Service

23
Q

What is a DDoS attack?

A

A malicious attempt to disrupt the normal traffic of a targeted server with a flood of Internet requests

24
Q

How does a DDoS attack work?

A

Multiple interconnected devices in different locations establish a botnet

The attacker is then able to direct the attack by sending remote instructions to the bots to send requests to the target’s IP address

The server becomes overwhelmed, and genuine requests cannot be handled

The server fails or times out

25
How can you protect against DDoS attacks?
A firewall can filter through requests to separate the genuine and fradulent requests
26
What are biometrics?
Pre-recorded characteristics to authenticate authorised users of a system/device
27
What are some examples of biometric authentication?
Facial recognition Iris and retina scanners Fingerprint recognition Voice recognition
28
What is two-step verification?
Two authentication methods performed one after the other to prove someone's identity
29
What are automatic software updates?
These updates will keep applications and the OS up-to-date. This enables bugs and security flaws in the software to be fixed with a patch
30
What does SSL stand for?
Secure Socket Layer
31
What does SSL stand for?
Provides a secure channel between two computers or device operating over the internet
32
What is SSL used for?
SSL is used to secure communication between a web browser and a web server. It will then use an HTTPS address for the website Similar to asymmetric encryption
33
What can privacy settings allow a person to do?
Control what information about them is shared on a social media platform. A user can control who has access to what they post, and who can see their full profile
34
What could be counted as a proxy server?
Any machine that checks and forwards traffic between networks or protocols.
35
What does a proxy server do?
It's an intermediary server that separates end-user clients from their destination site. It can provide varying levels of functionality, security and privacy.