S6 Cyber Security Flashcards

(36 cards)

1
Q

What is computer security and why is it important?

A

Computer security involves protecting computer systems and information from harm, theft, and unauthorized use. It is important to safeguard sensitive data and ensure the smooth operation of services.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

How does a firewall help secure a computer system?

A

A firewall monitors and controls incoming and outgoing network traffic based on security rules.

Example: Blocking unauthorized access while permitting legitimate communication.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What role does antivirus software play in securing a computer system?

A

Antivirus software detects, prevents, and removes malware.

Example: Regularly scanning files and quarantining infected ones to prevent damage.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

How does encryption contribute to computer security?

A

Encryption converts data into a coded format to prevent unauthorized access.

Example: Using encryption for email communications and storing sensitive information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Why are strong passwords and multi-factor authentication important for security?

A

Strong Passwords: They are difficult to guess, usually containing a mix of letters, numbers, and symbols. Multi-Factor Authentication (MFA): Requires more than one method of authentication to verify a user.

Example: Passwords like P@ssw0rd123! and MFA involving both a password and a code sent to a phone.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the significance of regular software updates and patching?

A

Regularly updating software fixes security vulnerabilities.

Example: Installing security patches for operating systems and applications.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

How does data backup enhance security?

A

Regularly backing up data ensures recovery from data loss or corruption.

Example: Using cloud storage or external hard drives for backups.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Why is education and training important in cybersecurity?

A

Educating users about cybersecurity best practices helps prevent attacks.

Example: Training employees on how to recognize phishing attempts and avoid social engineering attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Summarize the importance of a multi-layered approach to secure computer systems.

A

Implementing firewalls, antivirus software, encryption, strong passwords, regular updates, data backups, and user education collectively provide robust protection against threats.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is cyber security?

A

The processes, practices and technologies designed to protect networks, computers, programs and data from attack, damage or unauthorised access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is the main purpose of cyber security?

A

To protect systems and data from unauthorised access, damage, or theft.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is social engineering?

A

Manipulating people to give up confidential information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is malware?

A

Malicious software designed to damage, disrupt or gain unauthorised access to systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is pharming?

A

A cyber attack that redirects a website’s traffic to a fake website.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Why are weak or default passwords a threat?

A

They are easy to guess or crack, making systems vulnerable to unauthorised access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is the risk of misconfigured access rights?

A

Users might have access to data or functions they shouldn’t, increasing security risk.

17
Q

Why are removable media a security threat?

A

They can carry malware or be lost/stolen, leading to data breaches.

18
Q

What is the danger of unpatched software?

A

It may have known vulnerabilities that can be exploited by attackers.

19
Q

What is penetration testing?

A

Attempting to gain access to a system without normal credentials to test for vulnerabilities.

20
Q

What is internal penetration testing?

A

Simulates an attack from within the organisation using some knowledge or credentials.

21
Q

What is external penetration testing?

A

Simulates an attack from outside the organisation, with no credentials or insider knowledge.

22
Q

What is blagging (pretexting)?

A

Creating a fake scenario to trick someone into giving up information.

23
Q

What is phishing?

A

Fraudulently obtaining private info, usually via email or text, by pretending to be trustworthy.

24
Q

What is shouldering (shoulder surfing)?

A

Watching someone enter private info, such as PINs, over their shoulder.

25
How can social engineering be protected against?
Staff training, secure policies, awareness of suspicious activity, and two-factor authentication.
26
What is a computer virus?
A type of malware that replicates itself and spreads to other systems/files.
27
What is a trojan?
Malware disguised as legitimate software to trick users into installing it.
28
What is spyware?
Malware that secretly gathers user information, often tracking keystrokes or activity.
29
How can malware be protected against?
Antivirus software, firewalls, safe browsing habits, and not downloading unknown files.
30
What are biometric measures?
Security methods using physical characteristics (e.g. fingerprint, face ID) to identify users.
31
What are biometric measures mainly used for?
Securing mobile devices and allowing secure user authentication.
32
How do password systems improve security?
They restrict access to systems based on user credentials.
33
What makes a password strong?
A mix of letters, numbers, and symbols with sufficient length (12+ characters recommended).
34
What is CAPTCHA used for?
To distinguish humans from automated bots and reduce spam or attacks.
35
Why are email confirmations important?
They verify user identity and prevent fraudulent account actions.
36
How do automatic software updates improve cyber security?
They patch vulnerabilities and update security features without user action.