Cyber Security Flashcards
(16 cards)
What is spyware?
Spyware gathers information on the computer user. People uses it to find bank details or moments on the internet.
what does spyware get from your phone?
location, voice recordings, access the microphone, take a screenshot and view web history.
What is a Trojan Horse virus?
A program that masquerades as a legitimate software but is actually a virus.
What happens once you download a Trojan Horse?
The payload is released often without any noticeable effects. Then the virus will usually open a back door so the virus can send connections past the firewall
Can a Trojan Horse self-replicate?
NO
What are the vulnerabilities of a computer to malware?
- Switched of Firewall
- not updated virus protection software
- Admin rights failing
- Cracks in software
- human error
- social engineering
What is a macro
it is a set of instructions a computer follows so you don’t have to do them individually, it is used in excel. It is used in hacking as it follows a set of instructions without the user allowing them.
What is encryption
Encryption is where you disguise a piece of data so that only people that know how to unencrypt it can read it.
What is blagging?
Blagging is the act of creating and using an invented scenario to engage a targeted victim in a manner that increases the chance the victim will divulge information or perform actions that would be unlikely in ordinary circumstances.
What is phishing?
Phishing is a technique of fraudulently obtaining private information, often using email or SMS.
What is Pharming?
Pharming is a cyber attack intended to redirect a website’s traffic to another, fake site.
What is shouldering?
Shouldering is observing a person’s private information over their shoulder eg cashpoint machine PIN numbers.
What is social engineering?
It is when you manipulate people so they give you personal information such as passwords and bank details.
Why do hackers use social engineering?
Because it is easier to pretend to be trustworthy and to trick someone into giving you their personal data then to secretly hack it out of their computer.
What does captcha stand for?
Completely Automated public turing test to tell computers and humans apart
What is a white box Penetration test?
It is where give a tester a basic information This could include