Theory - Cybersecurity Flashcards

1
Q

Encryption key

A

Data used to encrypt or decrypt data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Hacking

A

Any attempt to gain unauthorised access to a computer system
Can target either a computer system itself or system’s users

Rootkit malware used by hackers to alter access levels to devices - hard to remove as it becomes embedded in the device’s OS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Social engineering

A

Attacks on users
Trying to exploit user rather than system using techniques such as phishing and shoulder surfing
Person is exploited into giving away critical information that gives access to network or accounts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Anti-malware software

A

Used to DETECT and REMOVE MALWARE on a computer system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Threat of data being intercepted can be reduced by…

A

encrypting data so that if it is intercepted it cannot be read

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

CAPTCHA

A

Technology intended to determine that a human and not a computer program is accessing a website

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Penetration testing

A

Attempt to hack into a system to test how secure it is
Improves security by highlighting security flaws that need to be fixed
Hacking authorised by network owner

Components of a good penetration test:
Technical vulnerabilities
Test of damage recovery

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Phishing

A

BAIT is used - email that looks legitimate or is an attractive offer to prompt the user to follow a link to a fake website
Involves attacker faking their identity

Eg. attempts to prompts users to go to a fake web page to enter their details

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Malware

A

MALICIOUS SOFTWARE designed to cause intentional damage to a computer system
Anti-malware software is used to detect and remove malware on the system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Why is data encrypted

A

Threat of data being intercepted can be reduced
Method of obscuring data so that it cannot be read if it is intercepted
If it is intercepted it cannot be read

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Brute-force

A

Repeatedly guessing a password until access is granted to system
Attempts to crack a password by trying every combination of letters and numbers

Dictionary attacks - use list of commonly used passwords or standard words in a dictionary

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Penetration testing

A

Attempting to hack a system on PURPOSE to identify SECURITY WEAKNESSES which can then be reported and fixed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

User access levels

A

Help to reduce the impact of any attacks that occur
If a hacker manages to get an employee’s password they will only be able to access part of system

Stop users from accessing services on the system that they do not normally need access to, so insider attacks would be reduced

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Cyber security

A

Process of ensuring networks and computers are SAFE from UNAUTHORISED ACCESS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Implant

A

Technology that is carried inside the body,
rather than simply on the body, such as a watch

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Biometric

A

Fingerprints and retinal images are examples of this type of information

17
Q

Pharming

A

When a website is spoofed, eg. a spoof banking website that looks identical to original
Involves using malware to alter IP address of a real website to direct user to a fake website
Malware being introduced to user’s computer or a server, e.g. a bank
Used to re-direct users to a fake website

Redirecting web traffic bound for a legitimate site to a fake, but still convincing, site

18
Q

Blagging (pretexting)

A

Perpetrator approaches a specific individual with an INVENTED STORY to persuade target to give out PRIVATE INFORMATION or access

19
Q

Malicious Insider / White-Box Testing

A

Test of computer system whereby an internal cyber-attack is simulated
Insider attack - When someone in an organisation gives away access details or sensitive information

20
Q

Shouldering

A

Watching people enter passwords or PINs

21
Q

Firewall

A

Network security device that monitors and filters incoming and outgoing network traffic based on an organisation’s previously established security policies
Barrier that sits between a private internal network and the public Internet
Prevents unauthorised data from leaving or entering the network

Software firewalls are programs installed on computers
Hardware firewalls are physical firewalls such as a linkeye server, that stops any unauthorised traffic from entering the network

Packet filtering firewall is a network security technique that regulates data flow to and from a network.
Security mechanism that allows packets to move across networks while controlling their flow through the use of a set of rules, protocols, IP addresses, and ports

22
Q

Patching

A

Process of ensuring that software updates have been installed

23
Q

Interception

A

When data is stolen as it is being transferred across a network

24
Q

Trojan

A

Malware which is hidden in legitimate software

25
Q

Active attack

A

When someone uses MALWARE or other technical methods to COMPROMISE a network’s security

26
Q

Passive attack

A

When a hacker eavesdrops on a network by ‘sniffing’ data packets

27
Q

Denial of service (DoS) attack

A

Tries to bring down a server by flooding it with many useless requests
Attack aims to overload the server - stops the server responding to legitimate requests

To protect against DoS attacks:
A server’s firewall can blacklist (ban) any traffic from an IP address which is known to perform DoS attacks
Firewalls can also monitor traffic in real time. So if a new IP address starts to send too much traffic then traffic limits can be set

Distributed denial of service attack:
Where multiple devices all send a DoS attack at the same time to a certain server

28
Q

Black box penetration testing

A

Done outside of an organisation
System administrator might pay an outside organisation to attempt to gain access to their systems in a controlled way
Allow system administrators to experience a ‘practice’ attack which is very similar to a real attack

29
Q

White box penetration testing

A

Test is done INSIDE an organisation
System administrators will test how vulnerable the system is against someone with knowledge of the system, and possibly a user account with low access rights
This will help to PREVENT insider attacks

30
Q

Spyware

A

Monitors keystrokes to find out passwords