Unit 6 - Cyber Security

studied byStudied by 0 people
0.0(0)
Get a hint
Hint

Cyber Security

1 / 22

encourage image

There's no tags or description

Looks like no one added any tags here yet for you.

23 Terms

1

Cyber Security

Measures taken to protect a computer, program and data against unauthorized access or attack

New cards
2

Malware

Malicious executable code that can run on a computer: Viruses, adware ,Pharming and Spyware are exam

New cards
3

Examples of Malware

Viruses, adware ,Pharming and Spyware

New cards
4

Virus

are small programs which aim to cause physical harm to a computer system.

New cards
5

Standard Virus

These hide in files / programs and replicate themselves in order to spread into other programs / files. Their aim is usually to delete or damage data.

New cards
6

Worm Virus

Try to replicate themselves, using more and more of the computer's resources, slowing down your computer and making it useless.

New cards
7

Trojan Virus

In the background of often programs which you can use, they cause harm and make changes to your computer set-up or creating a portal for other users to use and gain access.

New cards
8

Spyware

it is installed without the users knowledge and spies on the user activities by tracking them as the visit websites and installing a key logger that can read passwords and personal information. Personal data is then sent back to the hacker often through the use of cookies.

New cards
9

Pharming

-Pharming seeks to change the IP address in the DNS(Domain Name Server) to another IP address so that the user is sent to a phoney website instead of the one they intended.

New cards
10

Social Engineering

Manipulating people and is often used by criminals to force people to make mistakes which can compromise a network's security.

New cards
11

Weak and default passwords

If passwords are simple/or left as default, they will be more easily hacked, compromising the security of the system

New cards
12

Misconfigured access rights

Misconfigured access rights causes users to possibly have access to parts of the System that they shouldn't have access to, this can compromise the security of the system.

New cards
13

Removable Media

Removable media could contain malware, it may try to turn itself on when a the media is connected to the network. Once installed, it could then spread across the network, compromising the security of the network.

New cards
14

Unpatched/Outdated Software

Old software can create vulnerabilities in networks as the old software may not have been designed to protect against new advanced malware criminals develop.

New cards
15

Social Engineering- Blagging

Creating and using an invented scenario to engage a targeted victim in a manner that increase the likelihood of the victim to divulge information or perform actions that would be unlikely in ordinary circumstances.

New cards
16

Social Engineering - Phising

Sending emails purporting to be from reputable companies to induce people to reveal personal information.

New cards
17

Social Engineering - Shoulder/ Shoulder surfing

Observation on a person's private information over their shoulder.

New cards
18

Penetration Testing

A company will invite/employ experts to try to simulate a range of network attacks such as installing malware.

New cards
19

Biometric Measures

Physical features of a user are used to authenticate them on the system. This form of security is very effective in keeping systems secure as it cannot be shared easily, it can also identify the correct user out of billions.

New cards
20

Passwords

They're put in place to ensure that a network has no unauthorised access. It's important that they're strong so they harder to crack, they also should be changed regularly.

New cards
21

CAPTCHA

The system tries to combat malicious bots by challenging users to prove they're human by selecting certain images or ticking a box, both which bots cannot carry out consistently.

New cards
22

Email Configuration

Websites send users an email as part of a sign up process,when the link is pressed it confirms the user's identity to the website. This keeps networks secure.

New cards
23

Automatic Software Updates

Software patches and updates are vital. By enabling automatic software updates, when developers release a new security patch, the system will stay up to date and be protected.

New cards

Explore top notes

note Note
studied byStudied by 8 people
Updated ... ago
5.0 Stars(1)
note Note
studied byStudied by 16 people
Updated ... ago
5.0 Stars(1)
note Note
studied byStudied by 5 people
Updated ... ago
5.0 Stars(1)
note Note
studied byStudied by 51 people
Updated ... ago
5.0 Stars(1)
note Note
studied byStudied by 2 people
Updated ... ago
5.0 Stars(1)
note Note
studied byStudied by 4 people
Updated ... ago
5.0 Stars(1)
note Note
studied byStudied by 5 people
Updated ... ago
5.0 Stars(1)
note Note
studied byStudied by 44 people
Updated ... ago
5.0 Stars(1)

Explore top flashcards

flashcards Flashcard29 terms
studied byStudied by 77 people
Updated ... ago
5.0 Stars(1)
flashcards Flashcard100 terms
studied byStudied by 2 people
Updated ... ago
5.0 Stars(1)
flashcards Flashcard81 terms
studied byStudied by 3 people
Updated ... ago
5.0 Stars(1)
flashcards Flashcard63 terms
studied byStudied by 152 people
Updated ... ago
5.0 Stars(3)
flashcards Flashcard66 terms
studied byStudied by 2 people
Updated ... ago
5.0 Stars(1)
flashcards Flashcard20 terms
studied byStudied by 1 person
Updated ... ago
5.0 Stars(1)
flashcards Flashcard77 terms
studied byStudied by 7 people
Updated ... ago
5.0 Stars(1)
flashcards Flashcard56 terms
studied byStudied by 107 people
Updated ... ago
5.0 Stars(1)