Cyber Security Key Concepts: Malware, Phishing, Penetration Testing & More

0.0(0)
studied byStudied by 0 people
0.0(0)
full-widthCall with Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/21

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No study sessions yet.

22 Terms

1
New cards

Cyber security

Cyber security consists of the processes, practices and technologies designed to protect networks, computers, programs and data from attack, damage or unauthorised access.

2
New cards

Malware

the term used to refer to a variety of forms of hostile or intrusive software.

3
New cards

Pharming

a technique intended to redirect a website's traffic to another, fake site.

4
New cards

Weak and default passwords

Weak passwords are easily guessed and some users do not change the default password that the developer of a system may have used for testing purposes.

5
New cards

Misconfigured access rights

Each user is assigned individual access rights, and it is important that these should be set correctly to prevent information being given to the wrong people.

6
New cards

Removable media

Removable media such as memory sticks and removable hard drives can pose two major threats to an organisation: data theft and virus infection.

7
New cards

Unpatched and/or outdated software

Out of date software that has not been patched is a security risk as this can lead to unauthorised access to a system.

8
New cards

Penetration testing

Penetration testing is the process of attempting to gain access to resources without knowledge of usernames, passwords and other normal means of access.

9
New cards

Internal penetration testing

When the person or team testing the system has knowledge of and possibly basic credentials for the target system, simulating an attack from inside the system.

10
New cards

External penetration testing

When the person or team testing the system has no knowledge of any credentials for the target system, simulating an attack from outside the system.

11
New cards

Social engineering

the art of manipulating people so they divulge personal information such as passwords or bank account details.

12
New cards

Blagging (Pretexting)

the act of creating and using an invented scenario to engage a targeted victim in a manner that increases the chance the victim will divulge information.

13
New cards

Phishing

emails are designed to steal money, get login details, or steal an identity.

14
New cards

Shouldering (or shoulder surfing)

Using direct observation techniques to gain information such as passwords or security data by looking over someone's shoulder.

15
New cards

Computer virus

A program installed on a computer without knowledge or permission, designed to replicate itself and cause harm.

16
New cards

Trojan

A program that masquerades as having a legitimate purpose but actually serves a malicious function, often spread by email.

17
New cards

Spyware

Software that gathers information about a person or organization without their knowledge, often used to track Internet movements.

18
New cards

Biometric measures

Methods such as fingerprint scans, voice pattern samples, or retinal scans used for positive identification of individuals.

19
New cards

Password systems

Robust authentication systems with strict password rules designed to prevent unauthorized access.

20
New cards

CAPTCHA

An acronym for 'Completely Automated Public Turing test to tell Computers and Humans Apart', used to determine if a user is human.

21
New cards

Email confirmation

A process where a user must click on a link in a confirmation email to complete registration and activate their account.

22
New cards

Automatic software updates

A feature that allows software to be automatically updated to remove harmful code or vulnerabilities.