Cyber security

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/23

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

24 Terms

1
New cards

Malware

Malware is an umbrella term used to describe a variety of hostile or intrusive software

2
New cards

Malware: Virus

Malware that attaches itself to a host file or program and requires user action (like opening a file) to activate. Once activated, it self-replicates by infecting other files or programs on the system. ​

3
New cards

Malware: Worm

Malware that self-replicates and spreads automatically across networks without needing user action.

4
New cards

Malware: Trojan Horse

Malicious code disguised as legitimate software; once installed it creates a backdoor for attackers;

5
New cards

Malware: Ransomware

Malware that encrypts user files and demands payment for the decryption key;

6
New cards

Malware: Spyware

Malware that secretly gathers user data (keystrokes, browsing habits) and sends it to attackers;

7
New cards

Social Engineering: Pharming

Malicious code or DNS manipulation that redirects users to fake websites to harvest credentials;

8
New cards

Social Engineering: Phishing

Sending fraudulent emails or messages to mass audiences to trick recipients into revealing sensitive data;

9
New cards

Social Engineering: Shoulder Surfing

Observing someone’s private information (e.g. PIN at an ATM) over their shoulder to steal it;

10
New cards

Social Engineering: Blagging

Inventing a false scenario to persuade victims to divulge confidential information;

11
New cards

Penetration Testing: White Box Testing

Tester has full knowledge of system internals (source code, network maps, credentials) before attack;

12
New cards

Penetration Testing: Black Box Testing

Tester has no prior knowledge of the system; simulates an external attack with only public information;

13
New cards

Protection: Encryption

Scrambling data into ciphertext before transmission so only those with the key can read it;

14
New cards

Protection: Antimalware Software

Software suite that detects, quarantines and removes malware (antivirus, antispyware, antispam etc.);

15
New cards

Protection: Firewalls

Hardware or software systems that monitor and control incoming/outgoing network traffic based on security rules;

16
New cards

Protection: User Access Levels

Assigning permissions (read, write, execute, delete) to users/groups to restrict access to data/resources;

17
New cards

Protection: Automatic Software Updates

Automated downloading and installation of patches and feature updates to fix vulnerabilities without user intervention;

18
New cards

Protection: MAC Address Filtering

Allowing or blocking network connections based on a device’s unique hardware MAC address;

19
New cards

Authentication: Passwords

Secret strings of characters used to verify a user’s identity when logging in;

20
New cards

Authentication: Biometrics

Use of unique physical characteristics (fingerprint, iris, face) to confirm identity;

21
New cards

Authentication: Email Confirmation

Sending a code or link to a registered email address that the user must click or enter to prove ownership;

22
New cards

Authentication: CAPTCHA

Completely Automated Public Turing test to tell Computers and Humans Apart; challenge-response test to block bots;

23
New cards

Authentication: Advantages of biometric authentication over passwords (3)

  1. Can’t forget biometric measure

  2. No risk of shouldering when using biometric data

  3. Lower risk of hacking

24
New cards