Cyber Security Flashcards

(31 cards)

1
Q

What are 5 malicious codes ?

A

Virus ( computer ) , Trojan , spyware , ransomware and adware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is a virus ?

A

A virus is a piece of malware that infects a computer, and then replicates itself to be passed onto another computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is a Trojan ?

A

A Trojan appears to be a piece of harmless software, often given away for free, that contains malicious code hidden inside

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is ransomware ?

A

Ransomware hijacks the data on a computer system by encrypting it and demanding that the owners pay money for it to be decrypted

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is spyware ?

A

Spyware is a type of malware that collects the activity on a computer system and sends the data it collects to another person without the owner being aware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is adware ?

A

Adware is software that either causes pop-ups or windows that will not close. Generally the pop-ups or windows display advertisements

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are the 3 types of cyber security threats ?

A

Malicious code , social engineering and weak and default passwords

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are the 4 types of social engineering?

A

Phishing , pharming , blagging and shouldering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is blagging ?

A

Inventing a scenario to engage the victim and gain their trust

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is phishing ?

A

Obtaining private information often through an external link

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is pharming ?

A

A cyberattack where websites traffic is redirected to a fake site

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is shouldering ?

A

Viewing private information over the persons shoulder

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

How to protect yourself/ your company from blagging?

A

Businesses should provide security training to employees and do no give out information online or over the phone

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

How to protect yourself/ your company from phishing ?

A

Be aware of links in emails and check spelling and grammar mistakes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

How to protect yourself/ your company from pharming?

A

Ensuring the anti - malware system is up-to-date and internet browsers can use web filters to prevent users accessing these sites

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

How to protect yourself/ your company from shouldering?

A

Be wary of people and cameras when entering PIN numbers and passwords

17
Q

Give 2 examples of removable media .

A

USB memory sticks and DVDs

18
Q

What are 2 main threats of removable media ?

A

It can attempt to move onto a system when connected to a computer. If a computer is connected to other on a network, this could mean that the virus reaches hundreds of machines

19
Q

How could removable media negatively affect a network ?

A

Because it is storage devices that can be removed from the computer system

20
Q

What are access rights ?

A

Access rights set up what can and cannot be seen when someone logs into a system

21
Q

What is an example of misconfigured access rights ?

A

If theses are not set up correctly in an email server, a person may be able to see someone else’s emails

22
Q

What else can access rights be applied to ?

A

Ethical, legal and environmental impacts of digital technology

23
Q

Suggest what might happen if access rights are not managed thoroughly ?

A

They might be breaking the law

24
Q

What is default password?

A

A default password is the password that is alright on the router

25
Explain the risk if these are not changed
You can be hacked
26
What is a weak password ?
A weak password is a password that you made and it also vulnerable to hacking
27
Suggest 5 ways to ensure a safe, secure and strong password ?
Have a password that is six or more characters long, include upper and lower cases, include numbers, include symbols and avoid information that may be easy to guess
28
What is software at risk of ?
Software will reduce the vulnerability of a computer system
29
What might the word ‘patched’ mean ?
Updating software to fix a problem or add a new feature
30
What are users often offered ?
Users are often offered updates
31
Why might the user not take up these offered ?
Most anti - virus software will frequently update itself so that it is able to recognise the latest computer viruses and malware