Cyber Security Flashcards

(30 cards)

1
Q

What does Malware mean?

A

A software written to harm or cause issues with a computer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

How are a worm and virus different?

A

A virus depends on a human/program to spread itself, whereas a worm self-replicates.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is Keylogging?

A

Spyware that records what is typed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are the different types of malware?

A

Trojan, Spyware, adware, worm and virus.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Why might adware not pose any risks?

A

Many anti-virus programs will detect and prevent adware infecting a computer system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Why might companies want to use adware to promote their products?

A

It shows more people their product gaining them possible new customers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

How does a Trojan get installed onto your computer?

A

It disguises itself as a safe software.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What does spyware do without the users knowledge?

A

It collects the activity without the users knowledge.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is social engineering?

A

Manipulating People into giving out confidential information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are the different social engineering techniques?

A

Blagging, Phishing, Pharming and shouldering.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which technique obtains private information through an external link?

A

Phishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is Pharming?

A

A cyberattack where website’s traffic is redirected to a fake site.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is Blagging?

A

Inventing a scenario to engage the victim and gain their trust.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which technique is viewing private information over the person’s shoulder?

A

Shouldering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What do we need to protect or networks from?

A

Malware and hacking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are two examples of removable media?

A

USB and Hard drive

17
Q

What are the two main threats of removable media?

A

Data security/theft and spread of malware.

18
Q

Suggest what might happen if access rights are not managed thoroughly?

A

If access rights aren’t managed thoroughly users would have access to certain files which could be leaked or if they are hacked personal data could be stolen.

19
Q

Suggest 5 ways to ensure a safe, secure and strong password.

A

Change the password, don’t leave it as the default

  • Unique passwords
  • Don’t use the same password for al of your accounts
  • Change the password frequently
  • Test the password’s security
20
Q

What might the word ‘patched’ mean?

A

To improve or correct something.

21
Q

What is penetration testing?

A

Simulating an attack to find weaknesses.

22
Q

What is white box testing?

A

Simulating an inside attack.

23
Q

What is black box testing?

A

Simulating an outside attack.

24
Q

Why would black box testing be a more difficult method of testing a system?

A

Someone from the outside who has no knowledge of the system has to be hired which could put data at risk.

25
Why do you think companies might employ penetration testers?
They have to ensure hackers cannot access their client information or any other personal data stored there due to the data protection act.
26
What is adware?
A software that either causes pop-ups or windows that will not close.
27
What is a hacker?
A person who uses computers to gain unauthorized information.
28
What is cyber security?
The protection of networks, data, programs and computers against damage, cyber-attacks and unauthorised access.
29
Why are weak/default passwords a security risk?
Hackers can use brute force attacks to get past short or simple passwords easily, and social engineering can be used to figure out commonly used passwords like birthdays or addresses.
30
What are biometrics?
Measures that use scanners to identify people by a unique part of their body.