Unit 6 Cyber security Flashcards

1
Q

Cyber security threats that computers are vulnerable to

A
  • Pharming
  • Weak and default passwords
  • Misconfigured access rights
  • Removable media
  • Unpatched and/or outdated software
  • Malware including viruses
  • Social engineering
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Cyber security

A

Covers the different processes, practices and technologies that protect the following from attack, damage or unauthorised access:
- Networks
- Computers
- Programs and data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Password policy

A

Passwords are often checked as they are created to make sure that they conform to the parameters given in a required policy. Organisations and computer systems will often have password policies. These will make sure that your chosen password has features like:
- Minimum length of characters
- Include at least one lowercase letter
- Include at least one uppercase letter
- Include at least one symbol
- Change password every month

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Misconfigured access rights

A
  • Each user in an organisation is assigned individual access rights, according to their role
  • For example, most network users should not have access to setup and configuration settings
  • As people change roles within an organisation, or new roles are created, these rights have to be carefully managed
  • No one should have access to areas of folders that they do not need to do their job, as this can create a security weakness
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is pharming?

A

A cyber attack that redirects a user to a fake website

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

How does a pharming attack happen?

A
  • When your computer requests a website, it asks a DNS (Domain Name System) server for the IP address
  • The DNS server replies with the IP address
  • Your computer then sends a HTTP request to that IP address
  • If a hacker can change the entry on the DNS server, then they can make it point to a fake website that they control. The DNS server has been ‘poisoned’
  • The fake website may appear the same as the real website, however, it’s aim is to collect personal details, such as the log in to a bank account
  • The hacker can now use this to transfer money to themselves
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is removable media?

A

Any storage device that can be inserted and removed from a computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What can removable media be used for?

A
  • Steal documents and files from a company
  • Introduce malware
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

How could malware get onto removable media?

A
  • Being present on a home computer and then infecting the removable media device when inserted
  • Alternatively, a hacker could leave an infected USB flash drive in a car park or reception of a business. An interested employee can then put it into a computer
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is unpatched software?

A
  • Software needs to be regularly patched or updated
  • Many updates will contain fixes to known security issues
  • Hackers will be aware of these known security issues, making computers that haven’t been updated an easy target
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which types of software are the most important to update?

A

Operating system
- operating system updates often contain security updates
- it is crucial that the operating system is kept as secure as possible as it has full control of the computer or server

Anti-virus or anti-malware software
- needs to be updated regularly or daily so that it can detect new malware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which types of software are the most important to update?

A

Operating system
- operating system updates often contain security updates
- it is crucial that the operating system is kept as secure as possible as it has full control of the computer or server

Anti-virus or anti-malware software
- needs to be updated regularly or daily so that it can detect new malware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Explain how pharming poses a risk to computer systems, data or networks

A

A DNS server is compromised so that it points to a fake website which can then obtain personal information such as usernames and passwords

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Explain how weak and default passwords pose a risk to computer systems, data or networks

A

Make it easy for hackers to gain access using password lists or brute-force attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Explain how misconfigured access rights pose a risk to computer systems, data or networks

A

The give users to much access which they can then misuse

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Explain how unpatched or outdated software pose a risk to computer systems, data or networks

A

Leave security holes open

17
Q

Explain how removable media poses a risk to computer systems, data or networks

A

These can be used to introduce malware or remove confidential documents

18
Q

What is social engineering?

A

The ability to obtain confidential information by manipulating people for it

19
Q

What techniques can hackers use to gain information via social engineering?

A
  • Blagging, using an invented scenario to target someone
  • Phishing, using email or SMS (text) message to obtain information
  • Shouldering, observing information as it is entered
20
Q

What is shoulder surfing?

A

Shoulder surfing or shouldering is the ability to get information or passwords by observing as someone types them in

21
Q

Examples of shoulder surfing

A
  • Looking over someone’s shoulder
  • Using a CCTV camera
  • Viewing the reflection of a keyboard as a password is typed
22
Q

Preventing vulnerabilities

A
  • Penetration testing
  • Anti-malware software, including anti-virus software
  • Biometric measures, especially for mobile devices
  • Password systems
  • CAPTCHA
  • Email confirmation to confirm identity
  • Automatic software updates
  • Network security such as authentication, encryption, firewalls and MAC address filtering
23
Q

Anti-malware software

A
  • Will detect malware such as viruses, worms, trojans and spyware
  • When a virus or new malware is detected it is sent to the anti-virus company
  • They verify it is malware then create a signature of the virus
  • They then add it to their virus database and tell computers to run an update
  • Viruses can morph to avoid detection, this makes it harder to create a signature
24
Q

Describe how anti-virus software works

A
  • Anti-virus software can provide real-time protection
  • When a program is loaded or a file is downloaded, it is first checked to see if it contains a virus
  • Parts of the file are checked and compared with virus definitions of known viruses
  • If a match is found, the file can be quarantined and the user notified
25
Q

Passwords

A
  • Usernames and passwords are one of the most important ways of protecting computers and servers
  • They prevent unauthorised people from using the system
  • They also apply the correct access permissions to the user’s account
26
Q

Biometric authentication

A
  • Biometrics measure a person’s physical characteristics to verify their identity
  • One common method of authentication used on portable devices is a fingerprint
27
Q

Examples of biometric methods

A
  • Facial recognition, commonly now used on phones, tablets and some desktops
  • Retinal scans, more commonly used in high security environments
  • Palm vein recognition
  • Ear recognition
  • Voice recognition
28
Q

Starling Bank authentication

A
  • When registering a new bank account users need to provide a photo of their driving licence or passport
  • They then need to record a short video of themselves speaking a message
  • This can then be used to authenticate that the person talking is the same person as that in the driving licence or passport
29
Q

Automatic software updates

A
  • Many large companies such as Microsoft and Apple automatically update your software whenever they make a change to it
  • This could happen on a daily or weekly basis
30
Q

Why are software updates important?

A
  • Software updates fix bugs and offer security updates
  • If security holes are not updated or patched, a hacker can exploit them
  • Virus software needs to be set to auto-update so that it always has the latest virus definitions
  • Operating systems should either auto-update, or be updated as soon as possible if a security update is released
31
Q

Email authentication

A
  • On registration, an authentication email can be sent to the email address
  • This contains a unique web address link which needs to be clicked
  • Once the web page is visited, the web site knows that the user has access to the email account
  • It can then record that the email address has been authenticated
32
Q

CAPTCHA

A
  • Hackers and criminals are able to send multiple form submissions to web pages
  • This may be used to make log in attempts or add spam posts
  • CAPTCHAs are images that are easy for humans to interpret, but hard for computers
33
Q

Penetration testing

A

The practice of deliberately trying to find security holes in your own systems

34
Q

What is the goal of penetration testing?

A
  • Identify the targets of potential attacks
  • Identify possible entry points
  • Attempt to break in
  • Report back the findings
35
Q

White box penetration testing

A
  • White box penetration testing simulates a malicious insider with knowledge of the system
  • They will have permission to try to find weaknesses in the computer systems
  • They may have basic credentials such as a username and password for the target system
  • They will be given network and system information to help target possible attacks
  • Used to identify internal threats, simulates the damage that someone with inside knowledge could do
36
Q

Black box penetration testing

A
  • Back box penetration testing simulates an external hacking or cyber warfare attack
  • The company or engineer trying to find weaknesses in the system has no inside knowledge of the target system such as passwords or layout of the network structure
  • This simulates the damage that someone with no inside knowledge could do