Cyber Security KO

0.0(0)
studied byStudied by 5 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/23

flashcard set

Earn XP

Description and Tags

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

24 Terms

1
New cards
Cyber Security Threats
Social Engineering Blagging (Pretexting) Fraudsters make up a scenario to con victims into revealing something they would not ordinarily do.
2
New cards
Cybersecurity
is concerned with the protection of computer systems, computer networks and data.
is concerned with the protection of computer systems, computer networks and data.
3
New cards
Removable media
________ such as a USB pen drive can be a vector for transmitting malware.
4
New cards
CAPTCHA
is a test that can distinguish between humans and bots.
5
New cards
Biometric measures
biometric measures are required for user to be present when signing into a system.
6
New cards
Adware
adware includes banners and popups that are automatically installed onto a computer.
7
New cards
Black box testing
black box testing testers are given very little information about the network before the test. This is designed to simulate an outside attack or cyber warfare attack.
8
New cards
regular updates
Unpatched /outdated software Software needs ________ to fix security vulnerabilities in computer systems.
9
New cards
White box testing
White box testing testers are given some information about the network, such as network architecture, source code, and IP addresses.This is designed to simulate an attack by a malicious insider.
10
New cards
Penetration
penetration testing is legitimate testing of an organisations computer system to identify whether there are any vulnerabilities that an attacker could exploit.
11
New cards
Social engineering techniques
social engineering techniques manipulate people into giving away confidential and personal information.
12
New cards
Pharming
Pharming is when users are redirected to a site that they believe to be genuine because it looks just like the real site.
13
New cards
Password systems
________ can force users to have strong passwords that regularly need to be changed.
14
New cards
Spyware
spyware can be used to control your webcam and microphone.
15
New cards
Spyware records
spyware records record the activity on your computer such as your keystrokes, thereby logging your passwords and sending the data back over the network to a hacker.
16
New cards
Why are automatic software updates needed?
Automatic software updates to firewalls, operating systems, antivirus and other security software are needed so that software can be kept up-to-date against new malware, and to fix recently discovered vulnerabilities.
Automatic software updates to firewalls, operating systems, antivirus and other security software are needed so that software can be kept up-to-date against new malware, and to fix recently discovered vulnerabilities.
17
New cards
Malware
Malware Computer viruses replicate themselves and can transfer from one computer to another.
18
New cards
Its purpose is to
to protect computers and networks from cyberattacks to prevent unauthorised access to computers to protect computers against damage caused by malicious software to prevent data from being stolen to protect against the disruption of services running on the computer Cyber Security Threats Malware is software that has been purposely developed to damage, disrupt or take control of computer systems
19
New cards
What are the five reasons for why cyber-security is needed?
• to protect computers and networks from cyberattacks
• to prevent unauthorised access to computers
• to protect computers against damage caused by malicious software
• to prevent data from being stolen
• to protect against the disruption of services running on the computer
20
New cards
What are default passwords and why are they bad?
Default passwords -> upon registration for an online account, users may be given a default password that they do not change. Often these passwords are sent out, not encrypted, via email so pose a major security vulnerability.
21
New cards
How is removable media a cyber security threat?
Removable media such as a USB pen drive can be a vector for transmitting malware.
22
New cards
How are misconfigured access rights a cyber-security threat?
Misconfigured access rights -> users should only have access to files and data that they need, but sometimes they have can access other files.
23
New cards
Worms
Worms spread like viruses but do not require human intervention.
They attach themselves to network tools to spread automatically
around a network very quickly
24
New cards
Trojan
Trojan gains access to a computer by pretending to be legitimate
software. The Trojan allows unauthorised backdoor access to a
computer without the user being aware.