Topic 6 - Cyber Security Flashcards

(37 cards)

1
Q

What is authentication?

A

The act of verifying your identity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What does MAC address filtering do?

A

Allows you to block traffic from unknown machines or devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is a firewall?

A

A network security device that monitors and filters incoming and outgoing networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is encryption?

A

The process of encoding information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are the 5 reasons for hacking?

A

Hacktivist
Ethical
Financial gain
Achievement
Gaining information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is a hacktivist?

A

Someone who uses technology to announce religious, ideological or political messages

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is an ethical hacker?

A

A person employed to hack a network to find vunerabilities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is cybersecurity?

A

The practice of protecting systems, networks and programs from a digital attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is network security?

A

Any activity designed to protect a network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is malware?

A

Malicious software designed to gain access into a computer with malicious intent

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is a virus?

A

A self-replicating malware that spreads itself through a network and attaches itself to files

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is worms?

A

A self-replicating malware that spread through a network but doesn’t attach itself to files

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What do worms typically do?

A

Slow networks down

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is a trojan?

A

A piece of software that appears to perform a useful function but performs malicious actions.
Open a back door for a third party

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is ransomware?

A

A form of a virus that is self-replicating It encrypts files preventing the user access and will only decrypt files once a ransom is paid

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is spyware?

A

A malware that monitors and gathers information, such as monitoring internet usage for ads or keylogging to find passwords

17
Q

What is adware?

A

Software imbedded with ads

18
Q

What is a data breach?

A

A security incident in which sensitive or private data is stolen or views by an unauthorised user

19
Q

What are Denial-of-Service attacks (DoS)?

A

When cyber criminals flood a server with requests to overload the system

20
Q

What are Distributed-Denial-of-Service attacks (DDoS)?

A

When multiple devices flood a server with requests

21
Q

What is a zombie?

A

A computer compromised by malware, typically used for DDoS attacks

22
Q

What is a brute force attack?

A

A attack where the cybercriminal tries multiple passwords

23
Q

What is social engineering?

A

A set of methods used by cybercriminals to deceive an individual to hand over money or information

24
Q

What is blagging?

A

When a hacker invents a fake scenario to convince the victim to give up money or data
Usually they maintain conversation

25
What is phishing?
When the attack sends a malicious link via email which either steals money or data
26
What is pharming?
A link that redirects the victim to a fake site Done by changing the domain name
27
What is shouldering?
Physically stealing data or passwords by sight
28
What is eavesdropping?
Physically listening in on personal conversations to get details
29
What is tailgating?
A physical security breach into secured premises
30
What is an encryption key?
A piece of information used to encrypt and decrypt data
31
What is symmetric encryption?
When 1 key is used to encrypt and decrypt messages But if the key becomes public all messages can be decrypted
32
What is asymmetric encryption?
When there is a public and private key. Everyone knows the public key but only sender and receiver have private key so it is more secure
33
What is SQL injection?
It exploits an error in software design, enabling criminals to have access to sensitive data and too change, and delete data
34
What are code reviews?
A process that helps organisations find vulnerabilities
35
What is two-factor authentication?
When you are sent a unique code via text or email to confirm your identity Biometrics
36
What are misconfigured access rights?
When somebody has access to something they shouldn't
37
Why is removable media a security risk?
They may contain malware that could spread through a network to other devices