Cybersecurity Module Flashcards

(45 cards)

1
Q

What is ethical hacking

A

Ethical hacking involves testing security of computer systems, networks, web applications

Tested by simulating attacks from malicious hackers to identify vulnerabilities and weaknesses in system or network, to help organisation strengthen its security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is purpose of ethical hacking

A

Strengthen organisations security measures by identifying & resolving security weaknesses before they can be exploited by attackers

Forsee potential security threats, develop robust security protocols to prevent security breaches

Demonstrate to clients & stakeholders that organisation values data protection, committed to safeguarding information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is penetration testing

A

Simulating attack on a specific part of organisation’s infrastructure such as network, application, device.

Deliberately try to exploit security vulnerabilities to see if unauthorised access or other malicious activities are possible

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is black box penetration testing

A

Tester has no prior knowledge of network infrastructure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is grey box penetration testing

A

Tester has partial knowledge of network infrastructure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is white box penetration testing

A

Tester has full knowledge of network infrastructure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is process of penetration testing

A

1) Planning, Obtaining Info

2) Scanning, Gaining Access

3) Maintaining Access, Analysing Risk

4) Reporting Findings

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are properties of ethical hacking

A

Authorisation: Performed with permission under contract

Purpose: Intend to improve system security

Reporting: Results privately reported to organisation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are properties of unethical hacking

A

No Authorisation: Performed Without permission, violates legal boundaries

Malicious Interest: Aims to steal, damage, disrupt operations

Misuse of Data: Exploit vulnerabilities, lead to theft, leaks, data damage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is role of privacy act 1988

A

Regulates handling of personal information about individuals

Protects personal information handled by federal government agencies, certain private sector organisations

All Australian & Norfolk Island government agencies, private sector & not-for-profit organisations (> $3 million), all private health providers, small businesses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is APP 1

A

Open and Transparent Management of Personal Information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is concept of australian privacy principles

A

13 principles, outlines standards/rights/obligations for handling/accessing/correction of personal info

Provide the base framework for how personal data must be treated

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is APP 6

A

Use of Disclosure of Personal Information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is APP 11

A

Security of Personal Information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is authentication

A

Verify identity of users trying to access network resources

Authentication usually requires something the user knows (Password / Security Token / Biometrics)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is characteristics of strong passwords in authentication

A

12-16 characters

Upper & Lower case, numbers, symbols

Avoid common words, phrases, easily guessable info

Different passwords every website

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is organisational approach to password policies in authentication

A

Change password every 3-6 months

Teach employees about importance

Use controls to ensure compliance with password policies

Regular checks ensure policies are followed & effective

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is password policies impact on data security in authentication

A

Strong policies minimise risk of data breaches

Encourage users to take responsibility for own security

Meet requirements for data protection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What is 2-factor authentication in authentication

A

Additional security layer, requires 2 forms of identification

Something you know, something you have

Reduces risk of unauthorised access

20
Q

What is biometrics in authentication

A

Fingerprints, Face ID, Voice Recognition

Difficult to forge, high level of security

Potential errors in recognition systems

21
Q

What is purpose of encryption

A

Protect data privacy

Ensure safe data transfer over internet

Data remains original & unaltered

Organisations comply with legal requirements

22
Q

What is public key encryption

A

Public key to encrypt data, private key to decrypt it

23
Q

What are features of public key encryption

A

Non-Symmetric: Public & Private key aren’t the same

Distribution: Public key can be shared, private key kept secret

Use Cases: Securing emails, authenticate digital signatures, establish secure connection

24
Q

What is private key encryption

A

Same key for encryption & decryption

25
What are features of private key encryption
Symmetric: Public & Private key the same Key Distribution Problem: Key shared securely between communicating parties Encrypt large amounts of data efficiently
26
What is social engineering (phishing) as methods to compromise security of system
Trick individuals to revealing confidential information Phishing - Sending fraud emails/messages, appear to be from trusted sources
27
What is denial of service as methods to compromise security of system
Overload system resources, make it unavailable to users DDoS - Multiple systems attacking single target, amplify attack's impact
28
What is back door as methods to compromise security of system
Pathway into system, bypass normal authentication methods Intentionally created by developers, installed through malware
29
What is IP spoofing as methods to compromise security of system
Attacker sends message to computer with forged IP address Pretends to be trusted host to gain unauthorised access to information/services
30
What is SQL injection as methods to compromise security of system
Exploits vulnerabilities in database layer of application Attackers execute malicious SQL commands
31
What is man-in-the-middle attack as methods to compromise security of system
Attacker intercepts communications between two parties, modify data being exchanged Impersonate one/both parties Occur in unsecured Wi-Fi networks or compromised security certificates
32
What is cross-site scripting as methods to compromise security of system
Vulnerability in web apps that allows attackers to inject malicious scripts into content viewed by others Steal cookies, session tokens, other sensitive info
33
What is types of malware as methods to compromise security of system
Viruses, worms, trojan horses, ransomware, spyware, adware Software designed to harm/exploit any programmable device or network
34
What is physical network threats as methods to compromise security of system
Physical damage to network infrastructure disrupts services Physical access to network = Data theft, hardware tampering - Theft of devices containing sensitive data
35
What is zero-day vulnerabilities as methods to compromise security of system
Flaws in software unknown to vendor, without patch Valuable to attackers, can be exploited Requires vigilance, prompt software updates to mitigate risks
36
What is cryptography
Securing communication of data through encryption, unreadable to unauthorised users
37
What is purpose of cryptography
Ensures confidentiality, integrity, authenticity, non-repudiation of information & communications Used in banking, secure communications, password protection
38
What is plain text
Original message / data that is readable, understandable without any decoding
39
What is cipher text
Encrypted version of plain text, produced through cryptographic algorithms Appears random, cannot be understood without correct decryption key
40
What is substitution as common ciphers
Replace elements of plain text with other characters, symbols, groups of characters
41
What is rotation cipher as substitution
Shifts alphabet by fixed number
42
What is random substitution cipher as substitution
Each letter of alphabet randomly linked to different letter or symbol
43
What is polyalphabetic cipher as substitution
Uses keyword to determine shift for each letter of plaintext Every letter in keyword is the number of shifts of corresponding letter in plaintext
44
What is brute force attack as methods for cracking substitution ciphers
Try every possible key until correct one found Impractical for ciphers with large number of possible keys
45
What is frequency analysis as methods for cracking substitution ciphers
Analyse frequency of letters/groups of letters in ciphertext Compare to typical letter frequencies in language of original message