cybersecurity Flashcards

(22 cards)

1
Q

what is social engineering?

A

a set of methods use to manipulate people into giving personal information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

what creates the largest risk of personal data being compromised?

A

human error

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

who performs social engineering?

A

humans

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

what is shouldering?

A

someone physically watching the victim type in sensitive information so they can steal it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

define name generator attacks

A

when an app or website ask for several bits of personal information to generate a name. they then use this to guess your password.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

what is a phishing attack

A

an email that looks legit, but is a scam. provides a link to scam website

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

name three signs of a phishing email

A

suspicious or unknown hyperlink
spelling errors in email
requests personal information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

what is blagging?

A

where the attacker invents a scenario to get personal information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

what does blagging usually involve

A

a conversation that ends up convincing the victim to give money or personal data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

name three signs of blagging

A

weird use of english
spelling mistakes
suspicious code

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

what is malware

A

software designed with malicious intent

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

what are viruses?

A

malicious form of self-replicating software. attaches itself to a file

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

what are worms

A

replicate themselves. spreads through networks and uses system resources.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

define ransomware

A

a form of virus. locks your computer and demands something to get it back

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

what are trojans

A

a piece of software which comes across as a regular bit of software but is actually a harmful virus.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

what happened in the wannacry cyberattack

A

200,000 computers got a virus because a known security flaw was exploited. all apple devices before 2017 got affected.

17
Q

define spyware

A

unwanted software that spys your computer

18
Q

define adware

A

can be a worm, a virus or a trojan. displays malicious adverts or pop-ups.

19
Q

can anyone legally hold data about you

20
Q

what do you have to register with to hold someone’s personal information

A

data protection registrar

21
Q

define the Data Protection Act

A

data must be accurate and up to date
you have a right to see what information is held about you
the data must be protected from unauthorised access.

22
Q

define identitty theft

A

when someone steals your identity