Computer Science - Lent 2 Test Cyber Security

studied byStudied by 2 people
5.0(1)
Get a hint
Hint

What is Cyber Security?

1 / 77

flashcard set

Earn XP

Description and Tags

Cyber Security

78 Terms

1

What is Cyber Security?

The processes, practices and technologies designed to protect networks, computers, programs and data from attack, damage or unauthorised access.

New cards
2

Social engineering techniques (will explain in more depth further on)

Blagging - making up a story to get information from the user

New cards
3

Phishing

trying to get people to click a link that is fake and could exploit your details

New cards
4

Shouldering

hearing/seeing something like a password. Obtaining data.

New cards
5

Why are social engineering techniques a threat

All your private information like your card details could be used and exploited by someone with malicious intent. All your money, data, time and privacy will all be lost.

New cards
6

Malicious code

A computer program that is meant to hurt you and your computer. They could spy on you and it could also be ransomware. Viruses, worms, and Trojans are examples.

New cards
7

Why is malicious code a threat

Your devices will be harmed and will have lost all your data, privacy, money and all your time, effort and work.

New cards
8

Weak and default passwords

A weak password is a password that can be easily guessed.

New cards
9

New cards
10

A default password is a password that is set when you buy something

New cards
11

Why are weak and default passwords a threat

  • very easy to guess - easily get hacked

New cards
12
  • for default, you need to change it or people can easily find it out whether it's on the internet or somewhere else and easily get into your device/account

New cards
13

Misconfigured access rights

When a user has been given too much permission

New cards
14

Why are misconfigured access rights a cyber security threat?

  • lets you access things you are not supposed to

New cards
15
  • the principle of least permission

New cards
16

Removable Media

Any secondary storage medium (USB pen drive, floppy disk, portable hard drive, DVDs, SD cards)

New cards
17

Why is removable media a cyber security threat?

  • can easily access your things because you have uploaded your data onto it

New cards
18
  • write a virus/malware onto the device

New cards
19
  • operating systems automatically launch the content

New cards
20

New cards
21

Social aspect: "you can not bring a USB pen drive to school and plug it in"

New cards
22

New cards
23

Technological aspect: "you can not bring a USB pen drive into school however even if you do plug it in the computers will block it"

New cards
24

Unpatched and/or outdated software

Bugs or flaws which can be exploited by malware if they have not been fixed/patched

New cards
25

Why are unpatched/outdated software a cyber security threat

-device can easily be exploited by malware if not fixed/patched

New cards
26

What is Malware?

A virus, code or script put onto your computer that is an executable software and damages it

New cards
27

What can a hacker do with malware?

Leak data + information, collect personal data, identity theft, manipulate data, sell the data, payment and infect into your computer.

New cards
28

Computer Virus

A piece of code that is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data

New cards
29

Trojan

A program that appears harmless but is in fact malicious

New cards
30

It is piggybacking another piece of program

New cards
31

Adware

software that automatically displays or downloads advertising material (often unwanted) when a user is online.

New cards
32

Piggybacked off another program to trick the user into installing it

New cards
33

Spyware

software that enables a user to obtain covert information about another's computer activities by transmitting data covertly from their hard drive.

New cards
34

New cards
35

E.g webpages visited, internet surfing habits, email addresses + passwords etc.

New cards
36

Worm

Stand-alone piece of software that spreads on its own

New cards
37

Difference between a worm and a virus

A virus is a code that relies on a host

New cards
38

A worm is a standalone piece of software that spreads on it's own

New cards
39

Ways to prevent malware

  • improved code

New cards
40
  • regular updates to software, operating systems, virus programs

New cards
41
  • installing firewalls

New cards
42
  • educating users

New cards
43

Code Red Worm

A form of malware activated online on July 13, 2001 that infected any web server using Microsoft's IIS web server software. It penetrated 975,000 hosts and displayed the words "Hacked by Chinese!" across infected web pages and ran entirely in each machine's memory and in most cases left no trace. It costed $2.4pm

New cards
44

What is Social Engineering?

the art of manipulating people so they give up confidential information

New cards
45

Blagging

Making up a story to get information out of you (passwords, emails, security pin codes)

New cards
46

Example Scenario of Blagging

One scenario is if someone calls you saying that someone has hacked into your bank account and robbed it and asked you to give out some of your details and you did it they could get your information.

New cards
47

How to prevent blagging

Train people how to recognise blagging

New cards
48

Phishing

Trying to get people to click on a link that is fake to gather and exploit your details

New cards
49

How to spot that an email is not genuine

  1. The message is sent from a public email domain- no legitimate organisation would send an email that ends in @gmail.com

New cards
50

New cards
51
  1. The domain name is misspelt - for example if the email address is @microsftonline.com it is spelt wrong

New cards
52

New cards
53
  1. The email is poorly written - spelling mistakes

New cards
54

New cards
55
  1. It includes suspicious attachments or links

New cards
56

New cards
57
  1. The message creates a sense of urgency

New cards
58

Pharming

A cyber attack intended to redirect a websites traffic to another lookalike fake site

New cards
59

Pharming Attack

You would be lured to a website hosting malicious code and then it would download a trojan on your computer. It would then completely redirect you to websites. Then they would finally redirect you to a real bank and get your personal details when you enter them.

New cards
60

How do you prevent Pharming?

The web address will look slightly different so always check. Also check for the hhtps as that means it is a secure site.

New cards
61

Shouldering

Hearing/seeing your details like a password/PIN code etc.

New cards
62

If you were a hacker... explain some of the 'best' places to go to try and shoulder people. Include what kind of information you could steal.

When withdrawing cash as they could see you type in your pin code for your card.

New cards
63

How do you prevent Shouldering?

Privacy Screens

New cards
64

Security Measures

Any steps, actions or measures taken as a precaution against computer/data related theft, espionage, sabotage etc.

New cards
65

Biometric Measures

Technical term for body measurements and calculations. It refers to metrics related to human characteristics. Biometric is a factor to authenticate identification and access control.

New cards
66

Password Systems

Common method of preventing unauthorised access, requires a password to gain access. Can be made more secure by implementing password rules.

New cards
67

What does CAPTCHA stand for?

Completely Automated Public Turing Test To Tell Computers and Humans Apart

New cards
68

CAPTCHA (or similar)

Used to determine if the user is a machine or not

New cards
69

It works as it displays text in which is indecipherable by a computer using automated text recognition software.

New cards
70

Using Email confirmations

The user is not granted access until they click on the link sent to an email address they have supplied, therefore verifying and validating your email address. It provides some confidence that the user is a real one as the email address is real.

New cards
71

Automatic Software updates

The concept of keeping software's up to date. Automated software updates enable d help keeps a product up to date and flaws are fixed as soon as possible without the need of manual intervention.

New cards
72

Penetration Testing

Attempting to gain access to recourses, potentially without knowledge of usernames, passwords and other normal means of access

New cards
73

White hat hackers

security experts, sometimes ex- hackers, who are employed by a company. Using their expertise to find vulnerabilities and fix them - legal

New cards
74

Grey hat hackers

not employed by a company, try to find flaws in company systems. What they do is technically illegal but they then inform the company of the flaw so that they can fix them.

New cards
75

Black hat hackers

attempt to gain access via nefarious means. Maybe to steal company secrets or to cause damage to data - illegal.

New cards
76

White box penetration testing

simulates a malicious insider who has knowledge of and often basic credentials for the system being targeted - inside the company have access to the network, access to list of ip addresses. Simulating being a normal user in the company.

New cards
77

Black box penetration testing

simulates an external hacking attempt to a company or organisation or a cyber warfare attack - don't have physical access inside the company, don't have connection, don't have list orf server ip addresses. Outside the company.

New cards
78

Blagging

Make it up a story to try and get information out

New cards

Explore top notes

note Note
studied byStudied by 28 people
... ago
5.0(2)
note Note
studied byStudied by 159 people
... ago
5.0(1)
note Note
studied byStudied by 6 people
... ago
5.0(1)
note Note
studied byStudied by 5 people
... ago
5.0(1)
note Note
studied byStudied by 20 people
... ago
5.0(1)
note Note
studied byStudied by 63 people
... ago
5.0(2)
note Note
studied byStudied by 135 people
... ago
5.0(2)
note Note
studied byStudied by 53 people
... ago
5.0(1)

Explore top flashcards

flashcards Flashcard (29)
studied byStudied by 10 people
... ago
5.0(1)
flashcards Flashcard (44)
studied byStudied by 55 people
... ago
5.0(3)
flashcards Flashcard (26)
studied byStudied by 23 people
... ago
5.0(1)
flashcards Flashcard (29)
studied byStudied by 5 people
... ago
5.0(1)
flashcards Flashcard (30)
studied byStudied by 77 people
... ago
5.0(2)
flashcards Flashcard (67)
studied byStudied by 5 people
... ago
4.0(1)
flashcards Flashcard (95)
studied byStudied by 9 people
... ago
5.0(1)
flashcards Flashcard (20)
studied byStudied by 1 person
... ago
5.0(1)
robot