Summary

Cards (31)

  • What are some forms of cybercrime?
    Planting viruses, acquiring personal data, and disrupting services
  • How do cyber-attacks exploit human weaknesses?
    They take advantage of human gullibility
  • What is malware?
    Malicious software designed to cause harm
  • What is the function of antivirus software?
    To prevent malware from entering the system
  • What is ransomware?
    Software that prevents access to files until a ransom is paid
  • What is the purpose of spyware?
    To record actions and send data to a third party
  • How many viruses are created each day?
    Around 82,000 viruses
  • How do viruses spread?
    Through files, programs, or games that are downloaded
  • What distinguishes worms from viruses?
    Worms do not hide within other files
  • What are Trojan Horses in cybersecurity?
    Programs that pretend to be legitimate but are actually malware
  • What is social engineering in the context of cybersecurity?
    The manipulation of individuals to disclose private information
  • What is phishing?
    An email scam that directs users to fake websites
  • How can phishing be prevented?
    By implementing network policies and firewalls
  • What is pharming?
    A technique that redirects users to fake websites
  • How can pharming be prevented?
    By using anti-malware and firewalls
  • What is a brute force attack?
    A trial and error method to gain access to password systems
  • What is the purpose of encryption?
    To make data unreadable without a key
  • What is a DDoS attack?
    An attack that floods a server with excessive requests
  • What is SQL injection?
    A method that exploits web input forms to manipulate databases
  • What are the effects of a successful SQL injection attack?
    Bypassing authentication, executing queries, and altering data
  • What is an acceptable use policy (AUP)?
    A guideline detailing acceptable behavior on a network
  • What is penetration testing?
    A method to identify potential attack targets and entry points
  • What is the role of ethical hackers?
    To find system vulnerabilities before malicious hackers exploit them
  • What is the function of firewalls?
    To act as a barrier between attackers and the computer system
  • How do strong passwords help prevent brute force attacks?
    By making it difficult for attackers to guess passwords
  • What are biometric security measures?
    Security methods using physical characteristics like fingerprints
  • What is the purpose of user access levels?
    To restrict access to sensitive data based on user roles
  • How can poor network policy lead to security issues?
    By leaving users unaware of risks associated with their actions
  • What should a network manager ensure regarding user access?
    That users can only access facilities they need
  • What are the key components of a network policy?
    • Defines security rules and requirements
    • Outlines user access protocols
    • Ensures users have secure passwords
    • Regular backups and disaster recovery procedures
    • Maintenance of up-to-date security software
  • What are the strengths and weaknesses of different malware types?
    Strengths:
    • Viruses replicate and spread through files
    • Ransomware can encrypt data for ransom
    • Spyware collects sensitive information

    Weaknesses:
    • Malware can be detected by antivirus software
    • Users can be educated to avoid phishing
    • Firewalls can block unauthorized access