Topic 5 Flashcards

(53 cards)

1
Q

what is social engineering?

A

art of manipulating or ‘conning’ individuals into giving away private information or login IDs and passwords

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

common techniques of social engineering

A

phishing
shoulder surfing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

what is phishing

A

A phishing email is one that tricks you into handing over sensitive or personal information.
You receive what looks like a legitimate email,(for example from a bank or an organisation such as PayPal or eBay)
The website urges you to visit a bogus website and enter your personal details, which are then captured by the phishers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

when are phishers successful

A

when the user that receives the email click the link

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

how to recognise phishing email

A

greetings, email address,forged link, request for personal information, sense of urgency and poor spelling and grammar

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

how to prevent phishing

A

use spam filter and don’t open if not sure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

what is pharming

A

threat that tricks users into divulging private information,by clicking the link the download of a malicious code is triggered that will redirect the user to a a fake website

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

what is shoulder surfing

A

direct observation of a user entering their security details

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

forms of cyber attacks

A

planting viruses, acquiring and using personal or confidential data and disrupting a website or service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Brute force attacks

A

a hacker may go through a list of different passwords until access to an account is gained
Alternatively, the attacker may try every combination of characters until the correct password is found

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

security methods

A

spam filters, antivirus, biometrics device, two-factors verification, encryption, firewall, anti-malwares

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

what does firewall do

A

checks ingoing and outgoing network traffic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

features of internet

A

A worldwide collection of interconnected networks.

Relies on physical infrastructure that allows networks and individual devices to connect with other networks and devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

feature of WWW

A

WWW is only part of the internet that users can access using a browser..
Based on the HyperText
Transfer Protocol - HTTP (5.1.3)
A way of accessing information using the internet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

what can users do on the internet, what does url do

A

send receive emails
Uniform resource locators (URL’s) are used to specify the location of web pages.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

HTTP

A

Hypertext transfer protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

what is WWW

A

collection of multimedia web pages and other information on websites.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

how are URLs used in WWW

A

specify the location of web pages.
Eg .co.uk .gov .edu .sch .co.fr .co.fr .com

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

how cac computers comunicate with each other

A

follow set f protocols,
IP TCP, HTTP(S)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

IP

A

internet protocol
A protocol to route the packets
Each device on the internet has an IP address that uniquely identifies it from all other devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

TCP

A

transmission control protocol
Splits the messages sent across the internet into smaller pieces called ‘packets’
Assembles the packets in the correct order at the receiver end

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

search engine

A

A type of website that allows you to look up information on the World Wide Web.

23
Q

websites

A

A series of web pages located on the internet. They are often written in a programming language called HTML(hypertext markup language), and frequently contain text and images

24
Q

web server

A

A machine located on the internet that holds website pages

25
browser
sotware that allows you to look up info on WWW
26
URL
universe resource locator it is a web address (unique) eg. users can type a URL or click to a ling to go a web page
27
DNS
domain name system allows you to type a name such as google.co.uk into your web browser. It translates the web address google.co.uk into an IP address E.g. www.google.co.uk=74.125.131.94
28
DNS servers
13 DNS servers worldwide which keep a complete database of all name and IP addresses Other DNS servers lower down the hierarchy hold parts of the database When a DNS server receives a request not in its database, it will pass the request on to another server until it reaches one with the matching name and IP address Lower level DNS servers are owned by ISPs.
29
what is a cookie
small data file that a web server will put on to your computer when you visit a website
30
what does a cookie do
will save data such as any registration details that you enter, data last visited, any items bought from the site. Next time you access the same web page,the cookie file will also be sent, identifying your computer and the details that were saved on previous visits. Cookies can be useful because you see advertisements relevant to you and your recent searches Website preferences are saved Once you have registered on a website, on your next visit your user ID and password will be remembered and you will not need to retype them
31
role of a browser
The user types a web address (URL) into the browser’s address bar The web browser forwards this request to the web server to access the web page The web server acknowledges the request and sends the HTML source code for the web page to the user’s computer The source code is registered (translatedO into a viewable web page
32
what do ISPs do
compamy that supplies connectivity to the internet offer email services web hosting VOIP facilities
33
cybersecurity, what to do
checking spelling tone checking URLs Firewalls privacy settings( Configuring web browsers, social networking apps and other websites to limit who can view and access your content) proxy server (separate intermediary device between a user and remote web server that traffic must pass through) SSL (Provides a secure communication channel between two devices, secure socket layer
34
problems of centralization
Difficult to maintain confidentiality and security Have always been issues with digital currency
35
eg of decentralization
nick > nick’s wallet> Irina’s wallet> Irina
36
hoa are infos crypted in cryptocyrruncy
cryptography
37
can transactions be tracked
publicly available and therefore all transactions can be tracked (cash cannot) and the amount of money in the system is monitored
38
what is the blockchain
digital ledger, a timestamped series of records that cannot be altered
39
hash value
unique valid generated using a cryptographic hashing algorithm based on data in the block. This acts as the fingerprint of the block. Changing its continent will invalidate the hash value
40
timestamp
date and time when the block was created
41
block number
number of the block in the sequence
42
previous block hash
the hash value of the block preceding the current block in the blockchain
43
transactions data
details of transaction
44
who has a copy of the blockchain
-Every person on a peer-to-peer network receives it
45
what happens when a new block is created
copy is sent to everyone on the network for verification- this helps to maintain the integrity and trustworthiness of the data
46
how does a customer's browser check that website is secure
-requests web server to identify itself (SSL) - receives copy of SSL certificate - checks if it trustworthy - sends signal back to web server that certificate is authentic
47
type of malware that can be used to gather a user's login details
spyware
48
what is a proxy server
intermediary between a user and web server
49
what do proxy servers use to speed up access to certian websites
using cache they store pages after first visit
50
other functions of proxy servers
keep IP address secret can serve as additional firewall filters internet traffic, enables blocking of individual websites
51
what does a firewall do
monitors conncetions to and from your computer, closes any suspicious conncetions
52
2 layers present in TLS (transport layer security) protocol
handshake record
53
how is data sent using TLS
client/browser requests secure conncetion to server client/browser requests server to identigy itself server provides a digital certificate, which is then validated by client/browser client(browser send signal back to server session key is generated encyption methos is agreed