Cybersecurity Flashcards

1
Q

Cybersecurity

A

The practise of protecting systems, networks, and programs from digital attacks. These cyberattacks are usually aimed at accessing, changing, or destroying sensitive information; extorting money from users or interrupting normal business processes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Network Security

A

Any activity designed to protect the usability and integrity of a network and data. It includes both hardware and software technologies. Effective network security manages access to a network. It targets a variety of threats and stops them from entering or spreading on a network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Hackers

A

Individuals who will violate computer security for malicious or financial reasons;

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Planting the flag

A

Individuals who may seek financial reward for finding vulnerability, but are more interested in finding vulnerabilities than gaining something for themselves.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Ethical hackers

A

Individuals whose activities are designed to test and enhance computer security;

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Hacktivists

A

Individuals who use technology to announce a social, ideological, religious, or political message.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Social engineering

A

The psychological manipulation of people into performing actions or divulging confidential information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Keylogging

A

Software designed to record and store every keystroke made on a computer. Criminals often attempt to install keylogging software onto a computer remotely.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Tailgating

A

Tailgating is a physical security breach in which an unauthorised person follows an authorised individual to enter secured premises.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Pharming

A

Pharming redirects victims to a bogus site even if the victim has typed the correct web address. This type of scam is often applied to the websites of banks or e-commerce sites.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Phishing

A

Phishing is the act of trying to obtain confidential records such as passwords. Emails that look as if they are from a legitimate, respected organisation are sent, but they contain links to fake websites that ‘phish’ data from unsuspecting victims.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Digital devices

A

Devices that can be used for eavesdropping on live conversations or voicemails.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Eavesdropping

A

A technique that involves the social engineer being physically present to overhear confidential conversations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Shoulder surfing

A

Looking over another person’s shoulder to view passwords or other data that is being entered.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Pretexting

A

Attackers focus on creating a good pretext, or a fabricated scenario, that they can use to try and steal their victims’ personal information. This type of attack commonly takes the form of a scammer who pretends that they need certain bits of information from their target in order to confirm their identity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Baiting

A

Similarly to phishing attacks, the scammer promises items or goods to entice their victims.

17
Q

Malware

A

Short for malicious software, this is programming or code that is used to disrupt computers by:
Gathering sensitive information
Gaining access to private computer systems
Displaying unwanted advertising
Distributing the performance of a computer or network

18
Q

Trojan

A

A malicious computer program that tricks users into willingly running it is called a ‘Trojan horse’ or simply a ‘Trojan’. They can be delivered via internet downloads, infected USBs, or email attachments.

19
Q

Data breach

A

A data breach is a security incident in which sensitive, protected, or confidential data is copied, transmitted, viewed, stolen, or used by an individual who is not authorised to do so.

20
Q

Brute Force Attack

A

This type of attack can occur when a n attacker systematically submits guessed passwords with the hope of eventually guessing correctly

21
Q

DoS

A

A denial of service attack (DoS attack) is a cyberattack in which a criminal makes a network resource unavailable to its intended users by flooding the targeted machine or website with lots of requests in an attempt to overload systems and prevent some or all legitimate requests from being fulfilled

22
Q

DDoS

A

In a distributed denial of service attack (DDoS attack), the incoming traffic flooding the victim originates from many different sources. This makes it impossible to stop the attack simply by blocking a single source.

23
Q

Virus

A

Malware that usually embeds itself into existing software on a device and then, once that software is run, spreads to other executable files

24
Q

Worm

A

While also self-replicating, a worm does not need to infect an existing program. Worms are able to spread very rapidly, infecting large numbers of machines.

25
Q

Spyware

A

Programs that can spy on how a user makes use of their computer or device, for example by tracking the data entered via a keyboard, taking screenshots, or getting a list of running applications.

26
Q

Adware

A

Software that contains advertisements embedded in the application. It is not always a bad thing and is considered a legitimate alternative offered to consumers who do not wish to pay for software

27
Q

Exploit

A

Code that takes advantage of a security vulnerability in an operating system, application, or any other software code, including application plug-ins or software libraries.

28
Q

Exploit

A

Code that takes advantage of a security vulnerability in an operating system, application, or any other software code, including application plug-ins or software libraries.

29
Q

Exploit

A

Code that takes advantage of a security vulnerability in an operating system, application, or any other software code, including application plug-ins or software libraries.

30
Q

Ransomware

A

This type of Trojan can modify data on a computer or device so that it doesn’t run correctly or so that users can no longer use specific data. The criminal will only restore the computer’s performance, or unblock data, after the victim has paid them the ransom money they demand.

31
Q

Exploit

A

Code that takes advantage of a security vulnerability in an operating system, application, or any other software code, including application plug-ins or software libraries.

32
Q

Ransomware

A

This type of Trojan can modify data on a computer or device so that it doesn’t run correctly or so that users can no longer use specific data. The criminal will only restore the computer’s performance, or unblock data, after the victim has paid them the ransom money they demand.

33
Q

Exploit

A

Code that takes advantage of a security vulnerability in an operating system, application, or any other software code, including application plug-ins or software libraries.

34
Q

Ransomware

A

This type of Trojan can modify data on a computer or device so that it doesn’t run correctly or so that users can no longer use specific data. The criminal will only restore the computer’s performance, or unblock data, after the victim has paid them the ransom money they demand.

35
Q

Exploit

A

Code that takes advantage of a security vulnerability in an operating system, application, or any other software code, including application plug-ins or software libraries.

36
Q

Ransomware

A

This type of Trojan can modify data on a computer or device so that it doesn’t run correctly or so that users can no longer use specific data. The criminal will only restore the computer’s performance, or unblock data, after the victim has paid them the ransom money they demand.

37
Q

Exploit

A

Code that takes advantage of a security vulnerability in an operating system, application, or any other software code, including application plug-ins or software libraries.

38
Q

Ransomware

A

This type of Trojan can modify data on a computer or device so that it doesn’t run correctly or so that users can no longer use specific data.

39
Q

Ransomware

A

This type of Trojan can modify data on a computer or device so that it doesn’t run correctly or so that users can no longer use specific data.