Cyber Security Flashcards
(29 cards)
Why is cyber security important?
- protects data programs and computers against damage, cyber attacks and unauthorised access
- hackers often target organisations to access lots of sensitive information
What does penetration testing do?
- organisations employ specialists to stimulate potential attacks to identify vulnerabilities to fix
Describe the 2 types of penetration testing
- white box - stimulates malicious insider with knowledge of system to see what they can do
- black box - external cyber attack - tries to hack organisation in any way
What is malware?
- malicious software designed to cause harm to gain unauthorised access to a computer system
- without consent
What can malware do on a computer?
- deletes or modifies files
- locks files
- displays unwanted adverts - adware (pop up ads that can’t be closed)
- monitors user with spyware
- alters permissions using root kits
How can malware spread between devices?
- Virus = attach themself to files and spread by copying files and activate if opened
- worms= self replicate so spread quickly and exploit weakness in security systems
- Trojans = malware disguised as legitimate software and don’t replicate but users install them not realising their hidden purpose
4 types of social engineering
- Pharming
- Phishing
- Shouldering
- Blagging
Describe pharming:
- user directed to fake version of a website
- inputs personal details thinking they’re handing it to a legitimate account
- make sure anti malware is up to date
- use web filters to prevent fake sites
Describe phishing:
- criminals email or text leading to a fake website
- sent to thousands
- anti-phishing feature (firewall), poor grammar, follow links or update personal details
Describe shouldering:
- watching over a person’s activity
- watching PIN number or putting password into secured computer
- doesn’t require expertise
- be discreet such as covering the keypad when you enter PIN
Describe blagging:
- makes up story or pretends to be someone they’re not
- e.g. stuck in a foreign country so to send money
- e.g. phone victim to gain their trust as they pretend to be someone important
- use safety measures that can’t be given away - e.g. biometrics
How can networks be protected against threats?
- encryption
- anti-malware software
- user access levels
- automatic software updates
- MAC address filtering
How can networks be protected with encryption?
- when data is translated into a code when only someone with the correct key can access
- cipher text into plain text
- needed to send data over network securely
How can networks be protected with anti-malware software?
- stops malware from damaging the network
- e.g. firewall examines all data and blocks potential threats
- prevents unauthorised access into the network
How can networks be protected with user access levels?
- some have higher access levels than others and access to more sensitive data
- limits the number of people with access to important data so prevents attacks within an organisation
How can networks be protected with automatic software updates?
- used to fix security holes
- unpatched software can be easily exploited
How can networks be protected with MAC address filtering?
- way of making sure only people on a network are trusted users
- checks unique identification so only allowed devices can join the network
What are the ways of authentication?
- Passwords
- Biometrics
- Email Confirmation
- CAPTCHA
Describe passwords;
- simple methods
- strong with a combination of letters, numbers and symbols and can be changed regularly
- weak or default passwords are a big security risk
- hackers can use brute force attacks to get past short/ simple passwords and social engineering
Describe biometrics:
- uses scanners to identify people by a unique part of their body –> retina, fingerprint
- prevent unauthorised access
- quite secure and convenient for users
- more expensive to implement as they have special hardware
Describe email conformation:
- confirms that the email belongs to them
- stops people from using fake emails to sign up but since webmails are free people can sign up for new ones so not always effective
Describe CAPTCHA:
- Completely Automated Public Turing test to tell Computers and Humans Apart
- prevents programs from automatically creating accounts
- consists of simple things like typing out a blurred and distorted word from an image
- rely on computers not being able to read images as well as humans can
- image recognition software and AI is developing as machines are becoming more capable
What is ransomware?
- encrypts files on an infected system and only decrypts files once payment has been made to the hacker
What is spyware?
- gathers information about the use by tracking activity