SECTION 6: Cyber Security Flashcards

(48 cards)

1
Q

What is malware?

A

Malicious software designed to harm or exploit devices or data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is a virus?

A

Malware that attaches to files and spreads when opened.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is a worm?

A

Malware that self-replicates and spreads through networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is a Trojan?

A

Malware disguised as legitimate software.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is ransomware?

A

Malware that locks data and demands payment to unlock it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is spyware?

A

Malware that secretly records user activity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is social engineering?

A

Tricking people into giving away confidential information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is phishing?

A

Fraudulent emails or messages designed to steal information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is shouldering (shoulder surfing)?

A

Watching someone enter their PIN or password.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is blagging (pretexting)?

A

Inventing a false scenario to obtain private information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is brute force attack?

A

Trying many different passwords or PINs until one works.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is a denial of service (DoS) attack?

A

Flooding a network or server with traffic to crash it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is data interception and theft?

A

Capturing data as it travels across a network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is SQL injection?

A

Inserting malicious SQL commands into input fields to access or change a database.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is penetration testing?

A

Simulated attacks to find and fix vulnerabilities in systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is network forensics?

A

Monitoring and analysing network traffic to detect threats.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is anti-malware software?

A

Software designed to detect and remove malware.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is a firewall?

A

Software or hardware that blocks unauthorised access to or from a network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What is user access control?

A

Restricting access to files or systems based on user roles or privileges.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What is password protection?

A

Using secure, unique passwords to prevent unauthorised access.

21
Q

What is encryption?

A

Scrambling data so it cannot be read without a key.

22
Q

What is physical security?

A

Preventing unauthorised physical access to systems (e.g. locks, CCTV).

23
Q

What are ethical issues in computing?

A

Issues about right and wrong use of technology (e.g. surveillance, AI).

24
Q

What are legal issues in computing?

A

Issues involving laws (e.g. copyright, data protection).

25
What are environmental issues in computing?
Impacts on the environment (e.g. e-waste, energy use).
26
What are cultural issues in computing?
How technology affects cultures and societies (e.g. access to tech, social media effects).
27
What is the purpose of the Data Protection Act (2018)?
Protects personal data; gives people control over how it’s used.
28
What is the purpose of the Computer Misuse Act (1990)?
Prevents unauthorised access to or modification of data.
29
What is the Copyright Designs and Patents Act (1988)?
Protects the creators of original work from illegal copying or use.
30
What is the purpose of the Freedom of Information Act (2000)?
Gives the public access to data held by public organisations.
31
What is the purpose of the Regulation of Investigatory Powers Act (2000)?
Governs the surveillance and investigation of communication by authorities.
32
What is adware?
Malware that shows unwanted ads to generate revenue.
33
What is rootkit malware?
Malware that gives admin-level access to hackers.
34
One way to prevent phishing?
Don’t click suspicious links; check sender address.
35
One way to prevent shouldering?
Cover screen or keypad when typing sensitive info.
36
One way to protect against brute force attacks?
Limit login attempts and use CAPTCHA.
37
What is a DDoS attack?
Distributed DoS – uses multiple devices to flood a network.
38
What is heuristic analysis in anti-malware?
Detects new/unknown threats by analysing behaviour.
39
What is white-box testing?
Tester has full knowledge of system.
40
What is black-box testing?
Tester has no prior knowledge – like a real attacker.
41
What is a key in encryption?
A string used to lock (encrypt) or unlock (decrypt) data.
42
What is the difference between symmetric and asymmetric encryption?
Symmetric uses one key; asymmetric uses public and private keys.
43
Give 2 ways tech affects the environment.
Uses lots of energy; creates electronic waste (e-waste).
44
What is meant by sustainability in computing?
Reducing energy use and waste in tech design and use.
45
Give an ethical issue in AI.
Bias in algorithms leading to unfair outcomes.
46
Give an ethical issue in surveillance.
Loss of privacy
47
Illegal copying/distribution of software.
Creations of the mind (e.g. music, software) protected by copyright law.
48
What is software piracy?
Illegal copying/distribution of software.