cybersecurity Flashcards
(26 cards)
What is the Internet?
A worldwide collection of interconnected networks and devices that uses transmission protocols such as TCP and IP.
What is the World Wide Web (WWW)?
A collection of webpages and other information on websites that uses HTTP(S) protocols written in HTML.
What are URLs?
Uniform Resource Locators are used to locate and access web pages. The typical format is protocol://website address/path/file name.
What does HTTP stand for?
Hypertext Transfer Protocol.
What does HTTPS stand for?
Hypertext Transfer Protocol Secure.
What is a web browser?
Software used to connect to the internet, translating HTML code and ensuring SSL & TLS security.
What are cookies?
Small files stored on the user’s computer to track data and autofill forms.
Types of cookies include Session Cookies and Persistent Cookies.
What is digital currency?
A form of payment to pay for goods and services, including Debit/Credit Cards and Apps like Paypal.
What is cryptocurrency?
A digital currency that uses cryptography to maintain transaction security and operates on a Blockchain Network.
What is a Blockchain Network?
A system of interconnected computers where transaction data is stored, making hacking nearly impossible.
What is a brute force attack?
An attempt by hackers to guess passwords by trying all possible combinations.
What is data interception?
Stealing data by tapping into a wired or wireless transmission line.
Examples include Wardriving and Packet Sniffing.
What is a DDoS attack?
An attempt to prevent users from accessing part of a network, usually temporary but potentially damaging.
What is hacking?
The act of gaining illegal access to a computer system, leading to identity theft and data corruption.
What is malware?
Malicious software that includes viruses, ransomware, adware, Trojan horses, spyware, and worms.
What is phishing?
A method where attackers send legitimate-looking emails to bait users into giving out their information.
What is pharming?
A technique where attackers install malicious code to redirect users to fake websites.
What is social engineering?
A tactic where attackers create social situations to trick victims into revealing personal information.
What are access levels?
Different levels of access for different people to protect sensitive information.
What is antivirus software?
Software that protects a user’s computer from malware attacks.
What are biometric methods?
Authentication methods based on unique biological traits.
Examples include fingerprint scans, retina scans, and voice recognition.
What is two-step verification?
A security process that requires two methods of authentication to verify a user’s identity.
What are firewalls?
Hardware or software that monitors traffic between a network and a user’s computer.
What are proxy servers?
Intermediate servers that filter internet traffic and keep the user’s IP address confidential.