Fundamentals Of Cybersecurity Flashcards

1
Q

What is cybersecurity?

A

Cybersecurity is a series of processes, practices and technologies that protect networks, computers, software and data from damage, loss and unauthorised access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is social engineering?

A

Forms of cyberattack that focus on people, rather than pieces of technology, as the weak point in any system. Different ways to manipulate people

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are the 4 different forms of social engineering?

A

Blagging, Shouldering, Pharming, Phishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

How does blagging work?

A

Fabricating a scenario in order to gain unauthorised access to a system. IT Support

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

How does shouldering work?

A

Watching over someone’s shoulder as they type in their password

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

How does pharming work?

A

Redirecting users to an unsafe website by users own mistake to collect the user’s login credentials

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

How does phishing work?

A

Emails lure people to convincing but fake website pages where they transmit login details to an unknown person

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is malware?

A

Any program that works against the interests of you or your computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are examples of malware?

A

Computer viruses, Trojans, Adware, Spyware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are other threats to users?

A

Weak passwords, Misconfigured Access Rights, Removable Media, Unpatched Software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are methods used to detect and prevent cyberattacks?

A

Biometric measures, password systems, CAPTCHA, Email Confirmation, Automatic Software Updates, Penetration Testing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are computer viruses?

A

Self-replicating pieces of code that can damage data or software. They are often spread via attachments

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are Trojans?

A

Trojans are legitimate programs developed with the intention of hiding malicious code within

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is adware?

A

Adware are downloads of unwanted Internet adverts often observing online behaviour to target specific adverts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is spyware?

A

Spyware obtains sensitive data and transmits the data to a hacker across the Internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

How are weak passwords a threat?

A

Passwords that are easy to guess and default passwords can leave data vulnerable.

17
Q

What are the threats of misconfigured access rights?

A

Access rights are rules that tell a computer system which user should have access to which files and other resources. If the rights are not set properly, incorrect access may be granted

18
Q

What are the threats of removable media?

A

Any storage device that is highly portable can easily be used to steal data or introduce malware onto a system

19
Q

What are the threats of unpatched software?

A

When a security risk is identified in a program, the developer will release a patch. If the user does not install the patch, the computer will not be secure

20
Q

What is the role of biometric measures?

A

Using some part of a person’s biology to access a system instead of a password

21
Q

What are the role of password systems?

A

Automated procedures that ensure that sound password policies are followed. Users that do not adhere to policies are not let into the system

22
Q

What is the role of CAPTCHA?

A

Blurry text is presented to the reader which is human readable but difficult for a computer. This technology is used to ensure that a human is using the system

23
Q

What is the role of email confirmation?

A

Often when a password is changed, a user must verify this change by clicking a link sent to a registered email. This prevents third parties from changing passwords

24
Q

What is the role of automatic software updates?

A

When a new version of software is released, a computer can be configured to automatically download it so as to have updated security measures

25
Q

What is the role of penetration testing?

A

Someone tries to hack into a system working under the employer to identify weaknesses so that they can be resolved