User Security and Cyber Security Flashcards

1
Q

Define social engineering

A

manipulating people to breaking security procedures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Name 5 types of social engineering (5)

A

instant messaging

scareware

emails/phishing scams

baiting

phone calls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Purpose of access levels

A

different levels of access for different people

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What do user accounts control

A

user access rights

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

2 types of anti-malware

A

anti-virus

anti-spyware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

How anti-spyware remove spyware using the rules method (2)

A

looks for spyware features

identifies potential security issues

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

How does anti-spyware remove spyware using the file structure method (2)

A

looks for spyware file structures

removes them

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Function of passwords

A

restrict access to data/systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Examples of biometrics (4)

A

fingerprint scans

retina scans

face recognition

voice recognition

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Define 2 step verification (2)

A

authentication

uses 2 methods to verify users

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

When is 2 step verification used

A

online purchases

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Define automatic software updates (2)

A

updating software on user computer

improves software performance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Define brute force attacks

A

trying different combinations of letters/numbers/symbols until password found

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

How to prevent brute force attacks (2)

A

locking device once certain number of incorrect passwords guessed

strong password

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Define data interception (2)

A

stealing data by tapping into wired/wireless communication link

intent to obtain confidential information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Solution to data interception (2)

A

encryption

firewall

17
Q

What does DDoS stand for

A

distributed denial of service

18
Q

Define a DDoS attack (2)

A

prevents users from accessing part of network

floods network with useless spam traffic

19
Q

How DDoS attacks work (2)

A

attacker sends thousands of requests

website cannot service legitimate user’s request

20
Q

Define hacking

A

gaining illegal access to computer system without user permission

21
Q

Features of viruses (4)

A

program that replicates

corrupt files

cause computer to malfunction

need active host program/infected OS to work

22
Q

Features of worms (3)

A

standalone virus

replicates and spreads to other computers

arrive as message attachment

23
Q

Features of trojan horse (3)

A

program disguised as genuine software

carries harm to user computer system

will give cybercriminals user personal info

24
Q

How do trojan horses arrive as (2)

A

email attachtement

website download

25
features of spyware (3)
software gathers info based on user's actions sent info to cybercriminal
26
Features of adware
floods user with unwanted advertising
27
Features of ransomware (2)
encrypt data on user computer user pays cybercriminal to send decryption key
28
Features of phishing (3)
cybercriminal send legitimate looking email link in email sends user to fake website trick user to enter personal data to website
29
Features of pharming (3)
malicious code on user computer or infected website code directs user to fake website cybercriminal gains user personal info
30
What does DNS cache poisoning do (2)
changes IP values of real websites to fake websites redirects user to fake website
31
Define a biometric password
password which uses features that belong to human