Computer Science - Lent 2 Test Cyber Security

5.0(1)
studied byStudied by 2 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/77

flashcard set

Earn XP

Description and Tags

Cyber Security

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

78 Terms

1
New cards
What is Cyber Security?
The processes, practices and technologies designed to protect networks, computers, programs and data from attack, damage or unauthorised access.
2
New cards
Social engineering techniques (will explain in more depth further on)
Blagging - making up a story to get information from the user
3
New cards
Phishing
trying to get people to click a link that is fake and could exploit your details
4
New cards
Shouldering
hearing/seeing something like a password. Obtaining data.
5
New cards
Why are social engineering techniques a threat
All your private information like your card details could be used and exploited by someone with malicious intent. All your money, data, time and privacy will all be lost.
6
New cards
Malicious code
A computer program that is meant to hurt you and your computer. They could spy on you and it could also be ransomware. Viruses, worms, and Trojans are examples.
7
New cards
Why is malicious code a threat
Your devices will be harmed and will have lost all your data, privacy, money and all your time, effort and work.
8
New cards
Weak and default passwords
A weak password is a password that can be easily guessed.
9
New cards


10
New cards
A default password is a password that is set when you buy something

11
New cards
Why are weak and default passwords a threat
- very easy to guess - easily get hacked
12
New cards
- for default, you need to change it or people can easily find it out whether it's on the internet or somewhere else and easily get into your device/account

13
New cards
Misconfigured access rights
When a user has been given too much permission
14
New cards
Why are misconfigured access rights a cyber security threat?
- lets you access things you are not supposed to
15
New cards
- the principle of least permission

16
New cards
Removable Media
Any secondary storage medium (USB pen drive, floppy disk, portable hard drive, DVDs, SD cards)
17
New cards
Why is removable media a cyber security threat?
- can easily access your things because you have uploaded your data onto it
18
New cards
- write a virus/malware onto the device

19
New cards
- operating systems automatically launch the content

20
New cards


21
New cards
Social aspect: "you can not bring a USB pen drive to school and plug it in"

22
New cards


23
New cards
Technological aspect: "you can not bring a USB pen drive into school however even if you do plug it in the computers will block it"

24
New cards
Unpatched and/or outdated software
Bugs or flaws which can be exploited by malware if they have not been fixed/patched
25
New cards
Why are unpatched/outdated software a cyber security threat
-device can easily be exploited by malware if not fixed/patched
26
New cards
What is Malware?
A virus, code or script put onto your computer that is an executable software and damages it
27
New cards
What can a hacker do with malware?
Leak data + information, collect personal data, identity theft, manipulate data, sell the data, payment and infect into your computer.
28
New cards
Computer Virus
A piece of code that is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data
29
New cards
Trojan
A program that appears harmless but is in fact malicious
30
New cards
It is piggybacking another piece of program

31
New cards
Adware
software that automatically displays or downloads advertising material (often unwanted) when a user is online.
32
New cards
Piggybacked off another program to trick the user into installing it

33
New cards
Spyware
software that enables a user to obtain covert information about another's computer activities by transmitting data covertly from their hard drive.
34
New cards


35
New cards
E.g webpages visited, internet surfing habits, email addresses + passwords etc.

36
New cards
Worm
Stand-alone piece of software that spreads on its own
37
New cards
Difference between a worm and a virus
A virus is a code that relies on a host
38
New cards
A worm is a standalone piece of software that spreads on it's own

39
New cards
Ways to prevent malware
- improved code
40
New cards
- regular updates to software, operating systems, virus programs

41
New cards
- installing firewalls

42
New cards
- educating users

43
New cards
Code Red Worm
A form of malware activated online on July 13, 2001 that infected any web server using Microsoft's IIS web server software. It penetrated 975,000 hosts and displayed the words "Hacked by Chinese!" across infected web pages and ran entirely in each machine's memory and in most cases left no trace. It costed $2.4pm
44
New cards
What is Social Engineering?
the art of manipulating people so they give up confidential information
45
New cards
Blagging
Making up a story to get information out of you (passwords, emails, security pin codes)
46
New cards
Example Scenario of Blagging
One scenario is if someone calls you saying that someone has hacked into your bank account and robbed it and asked you to give out some of your details and you did it they could get your information.
47
New cards
How to prevent blagging
Train people how to recognise blagging
48
New cards
Phishing
Trying to get people to click on a link that is fake to gather and exploit your details
49
New cards
How to spot that an email is not genuine
1. The message is sent from a public email domain- no legitimate organisation would send an email that ends in @gmail.com
50
New cards


51
New cards
2. The domain name is misspelt - for example if the email address is @microsftonline.com it is spelt wrong

52
New cards


53
New cards
3. The email is poorly written - spelling mistakes

54
New cards


55
New cards
4. It includes suspicious attachments or links

56
New cards


57
New cards
5. The message creates a sense of urgency

58
New cards
Pharming
A cyber attack intended to redirect a websites traffic to another lookalike fake site
59
New cards
Pharming Attack
You would be lured to a website hosting malicious code and then it would download a trojan on your computer. It would then completely redirect you to websites. Then they would finally redirect you to a real bank and get your personal details when you enter them.
60
New cards
How do you prevent Pharming?
The web address will look slightly different so always check. Also check for the hhtps as that means it is a secure site.
61
New cards
Shouldering
Hearing/seeing your details like a password/PIN code etc.
62
New cards
If you were a hacker... explain some of the 'best' places to go to try and shoulder people. Include what kind of information you could steal.
When withdrawing cash as they could see you type in your pin code for your card.
63
New cards
How do you prevent Shouldering?
Privacy Screens
64
New cards
Security Measures
Any steps, actions or measures taken as a precaution against computer/data related theft, espionage, sabotage etc.
65
New cards
Biometric Measures
Technical term for body measurements and calculations. It refers to metrics related to human characteristics. Biometric is a factor to authenticate identification and access control.
66
New cards
Password Systems
Common method of preventing unauthorised access, requires a password to gain access. Can be made more secure by implementing password rules.
67
New cards
What does CAPTCHA stand for?
Completely Automated Public Turing Test To Tell Computers and Humans Apart
68
New cards
CAPTCHA (or similar)
Used to determine if the user is a machine or not
69
New cards
It works as it displays text in which is indecipherable by a computer using automated text recognition software.

70
New cards
Using Email confirmations
The user is not granted access until they click on the link sent to an email address they have supplied, therefore verifying and validating your email address. It provides some confidence that the user is a real one as the email address is real.
71
New cards
Automatic Software updates
The concept of keeping software's up to date. Automated software updates enable d help keeps a product up to date and flaws are fixed as soon as possible without the need of manual intervention.
72
New cards
Penetration Testing
Attempting to gain access to recourses, potentially without knowledge of usernames, passwords and other normal means of access
73
New cards
White hat hackers
security experts, sometimes ex- hackers, who are employed by a company. Using their expertise to find vulnerabilities and fix them - legal
74
New cards
Grey hat hackers
not employed by a company, try to find flaws in company systems. What they do is technically illegal but they then inform the company of the flaw so that they can fix them.
75
New cards
Black hat hackers
attempt to gain access via nefarious means. Maybe to steal company secrets or to cause damage to data - illegal.
76
New cards
White box penetration testing
simulates a malicious insider who has knowledge of and often basic credentials for the system being targeted - inside the company have access to the network, access to list of ip addresses. Simulating being a normal user in the company.
77
New cards
Black box penetration testing
simulates an external hacking attempt to a company or organisation or a cyber warfare attack - don't have physical access inside the company, don't have connection, don't have list orf server ip addresses. Outside the company.
78
New cards
Blagging
Make it up a story to try and get information out