3.6- Cyber Security

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/38

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

39 Terms

1
New cards

What is Cyber Security

Cyber security consists of the processes, practices and technologies designed to protect networks, computers, programs and data from attack, damage or unauthorised access

2
New cards

What is password policy

A policy set out by an organisation or computer system that ensure that passwords have features like:

  • Minimum length of characters

  • Include at least one lowercase letter

  • Include at least one uppercase letter

  • Include at least one symbol

  • Change password every month

3
New cards

What are the cyber security issues of weak or default passwords

• hackers could use brute force methods to crack passwords

• weak admin passwords would allow hackers to gain admin level access

• default passwords allow hackers to gain access without any effort

• default / stolen passwords published online so that everyone can find them.

4
New cards

How can companies protect against weak or default passwords

  • enforce a strong password policy, including admin accounts on all devices, across the company with passwords that are regularly changed

  • force users to change their passwords regularly to strong ones.

  • ensure default passwords are changed on all devices

  • implement biometric measures such as fingerprint / facial / retinal scans for user authentication

5
New cards

What are user access levels

The rights which a user has to a hard drive, folder or individual file. Some examples of access levels are: Read, Write, Modify, Execute and Comment

6
New cards

What are misconfigured access rights

When a user has access to files, folders, settings and/or drives that they should not have access to

7
New cards

How does misconfigured access rights cause a cyber security threat

• allows staff to access areas they are not supposed to

• network admins might not know that secure areas had been breached as no- one has ‘broken in’

• staff could reconfigure network

• staff could create new user accounts to give themselves admin access.

8
New cards

What can companies do to protect against misconfigured access rights

  • careful application of suitable access rights across the network reducing the level of access level of any one individual

  • make sure users only have access to the data / software they need

  • give read-only access instead of full access where possible

  • ensure that only relevant accounts have access to change DNS files.

9
New cards

What is a pharming attack

1. Hacker changes the entry on a DNS server to make it point to a fake website that they control; the DNS server has been poisoned
2. Computer requests the IP address of a website from a DNS (Domain Name System)
3. The poisoned DNS server sends back the IP address of a fake website
4. The fake website appears real so the user enters personal detail, like banking information
5. The hacker now has access to the user's personal information
6. The user is then redirected to a real website and told an error has occurred; they often have no idea that something has happened

This can be prevented using an up to date virus checker

<p>1. Hacker changes the entry on a DNS server to make it point to a fake website that they control; the DNS server has been poisoned<br>2. Computer requests the IP address of a website from a DNS (Domain Name System)<br>3. The poisoned DNS server sends back the IP address of a fake website<br>4. The fake website appears real so the user enters personal detail, like banking information<br>5. The hacker now has access to the user's personal information<br>6. The user is then redirected to a real website and told an error has occurred; they often have no idea that something has happened</p><p>This can be prevented using an up to date virus checker</p>
10
New cards

How does a pharming attack provide a cyber security threat

  • Data Theft – Users enter sensitive details (e.g., login credentials, financial information) into a fake website, allowing attackers to steal them.

  • Identity Fraud – Stolen personal data can be used to commit fraud or impersonate individuals.

  • Financial Loss – Cybercriminals may use stolen bank details to withdraw money or make fraudulent purchases.

  • Difficult to Detect – Unlike phishing (which requires users to click a fake link), pharming works behind the scenes, making it harder for victims to recognize.

11
New cards

What can companies do to protect against pharming attacks

  • Use up-to-date antivirus and anti-malware software

  • Check for HTTPS and security certificates on websites

  • Avoid clicking on suspicious links or pop-ups

  • Use a trusted DNS provider

12
New cards

Removable Media

Any storage device that can be inserted and removed from a computer. These can be used to steal documents and files from a company and introduce malware

13
New cards

How does removable media provide a cyber security threat

  • Malware Transmission – Infected removable media can introduce viruses, ransomware, spyware, or worms to a system when plugged in.

  • Data Theft – Attackers can use removable media to steal sensitive data by copying files from a device without authorization.

  • Unauthorized Access – If lost or stolen, removable media can allow unauthorized individuals to access confidential files, leading to data breaches.

  • Bypassing Security Measures – Some organizations use network security tools to protect against cyber threats, but removable media can be used to introduce malware offline, bypassing these protections.

  • Insider Threats – Employees may intentionally or accidentally use removable media to transfer or leak sensitive information, violating data protection policies.

14
New cards

How can companies protect themselves from removable media related cyber security threats

  • Disable or restrict the use of USB ports where unnecessary

  • Use encryption to protect data stored on removable media

  • Scan removable media for malware before use

  • Implement policies to regulate the use of external storage devices

15
New cards

Unpatched software

Software that hasn't been updated and may contain security issues

16
New cards

How can unpatched software cause a security threat

  • could allow staff or hackers to exploit known weakness / flaw

  • known weaknesses / flaws are published online

  • once in a hacker could install malware.

17
New cards

What can companies do to protect against unpatched or outdated software

software patches and updates are applied regularly (automatically) to keep the systems up to date, ensuring any recently discovered bugs or security issues are patched.

18
New cards

Social Engineering

Social engineering is the art of manipulating people so they give up confidential information.

19
New cards

Shoulder Surfing

This is where someone watches and records\remembers a victim entering their pin or security information such as passwords. (They can then use this information to gain access to a system);

20
New cards

Phishing

Is where the victim receives and responds to a communication that appears to be from a valid or known source but is in fact fraudulent. (It allows the fraudster to capture private information before the victim realises);

Phishing is a technique of fraudulently obtaining private information, often using email or SMS.

21
New cards

Phishing identifiers

Greeting is not personalised
Senders address is not personalised
Forged Link
Request for personal information
Sense of urgency
Poor spelling and/or grammar

22
New cards

Blagging (Pretexting)

This is where a victim is tricked/persuaded by a fraudster to give their details or payment information for a false reason/purpose;

23
New cards

Confidence Tricks

knowt flashcard image
24
New cards

Malware

Software that is intentionally designed to cause disruption, leak information or gain access to a system normally without the user knowing.

25
New cards

Virus

A type of malware that infects computers by replicating its code in other programs and causing harm to the computer by deleting, corrupting or modifying files. They can also infect other computers via the network or via email. Viruses:

  • Attach themselves to legitimate files or programs, so that when the infected files are executed, the virus spreads

  • It can corrupt or delete files, slow down performance, or make the computer unusable

  • Some viruses replicate themselves and spread to other files, making them difficult to remove

26
New cards

Trojan

A type of malware that is normally a program, game or cracked file that is something that the user wants and can cause damage, take control or provide access to a computer

27
New cards

Spyware

A type of malware that is normally installed without the users knowledge with the aim to spy on users activities via a website tracker or a keylogger

28
New cards

Anti-Malware Software

A type of software that will detect malware and help the computer to patch the vulnerability

29
New cards

Anti-Malware Software Procedure

1. When a virus or new malware is detected it is sent to the anti-virus company
2. They verify it is malware then create a signature of the virus
3. They then add it to their virus database and tell computers to run an update

When a file is downloaded, it is scanned by the software; if any of the files in the downloaded package match the signature of malware in the database, the file is quarantined before it can cause harm. The user is then notified and can stop the download

30
New cards

Passwords

A method of authenticating that a user is allowed to access a system and help to apply the correct user permissions to the users account

31
New cards

Biometric Authentication

The use of a person's physical characteristics in order the verify their identity. The most common methods of biometric authentication is fingerprint and facial recognition

32
New cards

Software Update

A type of software that patches bugs and offers security updates. This is normally done automatically

33
New cards

Email Authentication

The use of an email as a method of authenticating a user's identity. It can be used for verification of the user or a method of resetting user information

34
New cards

CAPTCHA

A method of authenticating whether a user is a computer. Stands for "Completely Automated Public Turing test to tell Computers and Humans Apart"

35
New cards

When would CAPTCHA be used

• account registration;
• account access;
• online voting systems;
• ticket purchasing / transaction completion;
• on pages where comments / reviews can be posted;
• on parts of the website where fraudulent click-throughs may be possible;

36
New cards

Penetration Testing

The practice of deliberately trying to find security holes in your own systems

37
New cards

Goals of Penetration Testing

Identify the targets of potential attacks
Identify possible entry points
Attempt to break in
Report back the findings

38
New cards

White Box Penetration Testing (malicious insider)

when the person or team testing the system has knowledge of and possibly basic credentials for the target system, simulating an attack from inside the system (a malicious insider)

39
New cards

Black Box Penetration Testing (external attack)

when the person or team testing the system has no knowledge of any credentials for the target system, simulating an attack from outside the system (an external attack).