Computer Science Cyber Security

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/19

flashcard set

Earn XP

Description and Tags

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

20 Terms

1
New cards

Cyber Security

The processes, practices and technologies designed to protect networks, computers, programs and data from attack, damage or unauthorised access

2
New cards

Social Engineering

The art of manipulating people so they give up confidential information

3
New cards

Blagging

The art of creating and using an invented scenario to engage a targeted victim in a manner that increases the chance the victim will divulge information or perform actions that they wouldn't normally do

4
New cards

Phishing

A technique of fraudulently obtaining private information often using email or SMS ('smishing')

5
New cards

Pharming

A cyber attack intended to redirect website traffic to another fake site

6
New cards

Shouldering

Observing a person's private information over their shoulder, e.g. at a cashpoint

7
New cards

Malicious Code (Malware)

Any hostile or intrusive software designed to cause damage to a computer or its data

8
New cards

Virus

A form of malware that can self-replicate and spread between connected devices

9
New cards

Trojan

A form of malware that is hidden within other, often legitimate, software

10
New cards

Spyware

A form of malware that records a user's keystrokes and actions on their computer for further fraudulent use

11
New cards

Adware

A form of malware that displays popup adverts on the user’s screen

12
New cards

Access Rights

The data and parts of a network that a user's account has privileges to use

13
New cards

Removable Media

Storage devices inserted or attached to computer systems (e.g. USB memory stick, CD/DVD, external HDD)

14
New cards

Software Patch

An update to a software program released by the program developers, often to fix security problems

15
New cards

Penetration ('Pen') Testing

Attempting to gain access to resources on a network or computer system without knowledge of usernames, passwords or other means of access

16
New cards

White Box 'Pen' Testing

Penetration testing simulating a malicious insider with some knowledge of the targeted system and its security measures

17
New cards

Black Box 'Pen' Testing

Penetration testing simulating an external hacking or cyber attack with no knowledge of the targeted system and its security measures

18
New cards

Biometrics

Methods using human characteristics (e.g. fingerprint, voice, retina) to restrict access to a computer system

19
New cards

CAPTCHA

Methods that determine if the access request is from a real human and not a computer 'robot'

20
New cards

Email Confirmation

Used to confirm that a sign up request has come from a genuine email account owned by that user