Topic 6 - Cyber Security Flashcards
(37 cards)
What is authentication?
The act of verifying your identity
What does MAC address filtering do?
Allows you to block traffic from unknown machines or devices
What is a firewall?
A network security device that monitors and filters incoming and outgoing networks
What is encryption?
The process of encoding information
What are the 5 reasons for hacking?
Hacktivist
Ethical
Financial gain
Achievement
Gaining information
What is a hacktivist?
Someone who uses technology to announce religious, ideological or political messages
What is an ethical hacker?
A person employed to hack a network to find vunerabilities
What is cybersecurity?
The practice of protecting systems, networks and programs from a digital attack
What is network security?
Any activity designed to protect a network
What is malware?
Malicious software designed to gain access into a computer with malicious intent
What is a virus?
A self-replicating malware that spreads itself through a network and attaches itself to files
What is worms?
A self-replicating malware that spread through a network but doesn’t attach itself to files
What do worms typically do?
Slow networks down
What is a trojan?
A piece of software that appears to perform a useful function but performs malicious actions.
Open a back door for a third party
What is ransomware?
A form of a virus that is self-replicating It encrypts files preventing the user access and will only decrypt files once a ransom is paid
What is spyware?
A malware that monitors and gathers information, such as monitoring internet usage for ads or keylogging to find passwords
What is adware?
Software imbedded with ads
What is a data breach?
A security incident in which sensitive or private data is stolen or views by an unauthorised user
What are Denial-of-Service attacks (DoS)?
When cyber criminals flood a server with requests to overload the system
What are Distributed-Denial-of-Service attacks (DDoS)?
When multiple devices flood a server with requests
What is a zombie?
A computer compromised by malware, typically used for DDoS attacks
What is a brute force attack?
A attack where the cybercriminal tries multiple passwords
What is social engineering?
A set of methods used by cybercriminals to deceive an individual to hand over money or information
What is blagging?
When a hacker invents a fake scenario to convince the victim to give up money or data
Usually they maintain conversation