Cybersecurity Flashcards

1
Q

Cybersecurity

A
  • The practice of protecting systems, networks, and programs from digital attacks.
  • These cyberattacks are usually aimed at accessing, changing, or destroying sensitive information; extorting money etc.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Network security

A
  • Activities designed to protect the usability and integrity of network and data. It includes both hardware and software technologies.
  • Effective network security manages access to a network, targeting a variety of threats
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Hackers

A
  • Individuals who will violate computer security of malicious or financial reasons
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Ethical Hackers

A

Individuals whose activities are to test and enhance a network’s security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Planting the Flag

A

Those who may seek financial rewards for finding vulnerabilities - more interested in finding vulnerabilities than personal gain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Tailgating

A

A physical security breach in which an unauthorised person follows an authorised individual to secured premises

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Phraming

A

Redirects victims to a bogus site even if it has the correct web address - usually applied to websites of banks or e-commerce

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Phishing

A

Act of attempting to obtain confidential records such as passwords by linking fake sites to “phish” data, through emails impersonating a company or entity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Shoulder surfing

A

Looking over a person’s shoulder to view passwords or other data being entered

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Pretexting

A

Forming a pretext/fabricated scenario which can be used to steal victims information - often through “confirming the identity” of the victim

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Malware

A

Programming or malicious code used to disrupt systems by:

  • gathering sensitive info
  • gain access to private systems
  • displaying unwanted ads
  • distributing performance of network
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Zombie

A

PC connected to internet which is compromised by hacker/virus and used to perform malicious tasks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

DoS attack

A

Flooding a system or network with many requests in an attempt to overload the systems and prevent operation of the network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

DDoS

A

As DoS attack, but originating from many sources - hard to prevent as cannot block a single source

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

SQL injection

A

Entering malicious SQL statements for execution

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Virus

A

Malware embedding itself into software on a device, and when ran, spreading to other files

17
Q

Worm

A

Self-replicating, able to spread rapidly and without infecting an existing program

18
Q

Ransomware

A

Type of trojan, holds the PC ransom

19
Q

Adware

A

Contains adverts embedded into application, considered an alternative for those who dont want to buy a license for a software and not always a bad thing

20
Q

Asymmetric Encryption

A

uses two keys: public and private key to decrypt

21
Q

Input sanitisation

A

removes SQL commands from input

22
Q

Caesar cipher

A

Replacing letters with plus or minus the key value e.g. +5, A becomes F

23
Q

Firewall

A

Controls incoming / outgoing traffic

24
Q

MAC address

A

Unique identifier that is used as a network address in network comms