1/19
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
Cyber Security
The processes, practices and technologies designed to protect networks, computers, programs and data from attack, damage or unauthorised access
Social Engineering
The art of manipulating people so they give up confidential information
Blagging
The art of creating and using an invented scenario to engage a targeted victim in a manner that increases the chance the victim will divulge information or perform actions that they wouldn't normally do
Phishing
A technique of fraudulently obtaining private information often using email or SMS ('smishing')
Pharming
A cyber attack intended to redirect website traffic to another fake site
Shouldering
Observing a person's private information over their shoulder, e.g. at a cashpoint
Malicious Code (Malware)
Any hostile or intrusive software designed to cause damage to a computer or its data
Virus
A form of malware that can self-replicate and spread between connected devices
Trojan
A form of malware that is hidden within other, often legitimate, software
Spyware
A form of malware that records a user's keystrokes and actions on their computer for further fraudulent use
Adware
A form of malware that displays popup adverts on the user’s screen
Access Rights
The data and parts of a network that a user's account has privileges to use
Removable Media
Storage devices inserted or attached to computer systems (e.g. USB memory stick, CD/DVD, external HDD)
Software Patch
An update to a software program released by the program developers, often to fix security problems
Penetration ('Pen') Testing
Attempting to gain access to resources on a network or computer system without knowledge of usernames, passwords or other means of access
White Box 'Pen' Testing
Penetration testing simulating a malicious insider with some knowledge of the targeted system and its security measures
Black Box 'Pen' Testing
Penetration testing simulating an external hacking or cyber attack with no knowledge of the targeted system and its security measures
Biometrics
Methods using human characteristics (e.g. fingerprint, voice, retina) to restrict access to a computer system
CAPTCHA
Methods that determine if the access request is from a real human and not a computer 'robot'
Email Confirmation
Used to confirm that a sign up request has come from a genuine email account owned by that user