Cyber Security Flashcards

1
Q

what is social engineering

A

art of manipulating or ‘conning’ individuals into giving away private information or login IDs and passwords

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

phishing is an example of

A

social engineering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

what is phishing

A

act of sending a malicious email to a target user, with the intent of stealing information from them

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

what is brute force attack

A

hacker may go through a list of the most common passwords until access to an account is gained. This is usually automated using common hacking tools.

Alternatively, the attacker may try every combination of characters until the correct password is found. An attacker could try doing this on an email account, a social media account or a standard computer account

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

what is malware

A

software that can cause harm to a computer system. Malware is a broad term which can include viruses, trojan horses and spyware. As well as harming computer systems, they also cause significant financial damage, denial of service (DOS) and lack of functionality to key infrastructure.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

what is DDoS attack

A
  • A DDoS attack occurs when a number of computer systems – often thousands – suddenly send an incredible amount of internet traffic towards a single server or system.
  • When this occurs, the bandwidth available for the target system, as well as system resources like CPU and RAM, become strained.
  • When enough traffic is sent to the target system at the same time, the target is knocked offline. It becomes inaccessible to legitimate users because the target cannot cope with the sheer volume of traffic.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

why does a DDoS attack occur

A

including hacktivism , nation-state actors performing attacks on rival countries, or simply a person or group of people doing it for their own personal reasons

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

what is hacking

A

gaining access to a computer system without authorisation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

what is pharming

A
  • form of fraud, and takes place online through malicious websites posing as legitimate businesses, such as banks.
  • The goal of pharming is to trick the user into sharing personal information such as bank details, passwords and email addresses.
  • Criminals will then sell this data or use it for identity theft and financial fraud.
  • Pharming takes place when a computer is infected with malicious code, which automatically sends the victim to a bogus website through an attack method called DNS poisoning .
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

what is data interception

A

malicious attacker intercepts data in transit – when it leaves one system to be transmitted to another system – and uses that data for their own criminal activities, or to perform further attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

computer virus

A

attaches itself to other programs (e.g. files) and then making copies of itself to spread from one computer to another. Modifies files and continues to spread.​

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Types of malware

A
  • computer virus
  • ransomware
  • trojan
  • keyogger/spyware
  • adware
  • worm
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

ransomware

A

prevents you from accessing your device (and the data stored) by encryption​

The computer may become locked or the data might be stolen, deleted or encrypted.​

Often spread through emails containing malicious attachments or drive-by downloading

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

trojan

A

downloads onto a computer but disguised as a legitimate program to get data​

Uses social engineering to get the users access password​

Trick you into downloading harmful programs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

keylogger/spyware

A

ecords what a person types on a device​

Keylogger is put on a computer when user downloads an infected application. Then, it monitors the actions that the user perform​

Can be installed through a text message, apps, infected website, etc.​

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

adware

A

catches the user’s attention through advertisement​

It secretly installs itself onto your device​

It is dangerous as it slows down your device and hijacks your browser to install viruses​

The most common way it gets installed in a computer is that it is downloaded from the internet usually through ads without your knowledge ​

17
Q

worm

A

operates by sending copies of itself from one device to another​

Has the capacity to replicate without human intervention​

Does not need to attach itself to apps or software to cause damage​

18
Q

what to access levels do

A

ensure that:

  • A user can only access their personal documents, and not others
  • A user can only access the shared documents that are relevant to them
  • Other users cannot view, edit, copy or delete data and information that doesn’t concern them
19
Q

what do Anti-virus and anti-spyware software do

A

actively scan the computer system and, upon finding malicious files or software, either place it in ‘quarantine’ (a safe place on the system) or simply delete it from the system

20
Q

Automatic software updates

A

Once a new strain of malware has been identified, software updates are usually very quick to roll out, so having ‘automatic updates’ enabled ensures these protections are automatically downloaded and installed on your system

21
Q

authentication (username and password, biometrics, two-step verification)

A

password - anyone with an account must adhere to a strict format when choosing a password
biometrics - scanning your fingerprint or retina: unique
two step - more security

22
Q

firewalls

A

prevent unwanted network traffic to and from your computer by closing and opening ports on a computer system, which are used by different protocols
A firewall closes ports that do not need to be open, and monitors traffic going in and out of ports that are open

23
Q

privacy settings

A

effective way to control your visibility and protect you from malicious users looking for your personal information

24
Q

proxy server

A

proxy server acts as a service to hide your IP address
- request goes from computer to proxy
- request then gets sent to to the web through the proxy

25
Q

Checking spelling and tone of communications

A

phishing emails often contain
- Bad spelling or grammar
- Non-personal greeting (for example Dear Sir/Madam)
- A sense of urgency, asking the user to perform an action quickly
- Asking the user to click on a link in the email

26
Q

Checking a link’s URL

A

it is good practice to check any URL before clicking, as sometimes the text shown is not the URL hidden behind the link. You can do this in most email applications by hovering the cursor over the link, which will show the real URL in a pop-up.

27
Q

SSL

A

SSL (Secure Socket Layer) is used to secure credit card transactions and data transfer, and is now becoming the norm for securing social media sites.
When you browse with SSL enabled, all traffic between your computer and the website is encrypted, so anyone who intercepts your data cannot make sense of it