Cyber Security Flashcards

1
Q

What are 5 malicious codes ?

A

Virus ( computer ) , Trojan , spyware , ransomware and adware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is a virus ?

A

A virus is a piece of malware that infects a computer, and then replicates itself to be passed onto another computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is a Trojan ?

A

A Trojan appears to be a piece of harmless software, often given away for free, that contains malicious code hidden inside

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is ransomware ?

A

Ransomware hijacks the data on a computer system by encrypting it and demanding that the owners pay money for it to be decrypted

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is spyware ?

A

Spyware is a type of malware that collects the activity on a computer system and sends the data it collects to another person without the owner being aware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is adware ?

A

Adware is software that either causes pop-ups or windows that will not close. Generally the pop-ups or windows display advertisements

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are the 3 types of cyber security threats ?

A

Malicious code , social engineering and weak and default passwords

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are the 4 types of social engineering?

A

Phishing , pharming , blagging and shouldering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is blagging ?

A

Inventing a scenario to engage the victim and gain their trust

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is phishing ?

A

Obtaining private information often through an external link

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is pharming ?

A

A cyberattack where websites traffic is redirected to a fake site

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is shouldering ?

A

Viewing private information over the persons shoulder

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

How to protect yourself/ your company from blagging?

A

Businesses should provide security training to employees and do no give out information online or over the phone

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

How to protect yourself/ your company from phishing ?

A

Be aware of links in emails and check spelling and grammar mistakes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

How to protect yourself/ your company from pharming?

A

Ensuring the anti - malware system is up-to-date and internet browsers can use web filters to prevent users accessing these sites

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

How to protect yourself/ your company from shouldering?

A

Be wary of people and cameras when entering PIN numbers and passwords

17
Q

Give 2 examples of removable media .

A

USB memory sticks and DVDs

18
Q

What are 2 main threats of removable media ?

A

It can attempt to move onto a system when connected to a computer. If a computer is connected to other on a network, this could mean that the virus reaches hundreds of machines

19
Q

How could removable media negatively affect a network ?

A

Because it is storage devices that can be removed from the computer system

20
Q

What are access rights ?

A

Access rights set up what can and cannot be seen when someone logs into a system

21
Q

What is an example of misconfigured access rights ?

A

If theses are not set up correctly in an email server, a person may be able to see someone else’s emails

22
Q

What else can access rights be applied to ?

A

Ethical, legal and environmental impacts of digital technology

23
Q

Suggest what might happen if access rights are not managed thoroughly ?

A

They might be breaking the law

24
Q

What is default password?

A

A default password is the password that is alright on the router

25
Q

Explain the risk if these are not changed

A

You can be hacked

26
Q

What is a weak password ?

A

A weak password is a password that you made and it also vulnerable to hacking

27
Q

Suggest 5 ways to ensure a safe, secure and strong password ?

A

Have a password that is six or more characters long, include upper and lower cases, include numbers, include symbols and avoid information that may be easy to guess

28
Q

What is software at risk of ?

A

Software will reduce the vulnerability of a computer system

29
Q

What might the word ‘patched’ mean ?

A

Updating software to fix a problem or add a new feature

30
Q

What are users often offered ?

A

Users are often offered updates

31
Q

Why might the user not take up these offered ?

A

Most anti - virus software will frequently update itself so that it is able to recognise the latest computer viruses and malware