Summary

    Cards (31)

    • What are some forms of cybercrime?
      Planting viruses, acquiring personal data, and disrupting services
    • How do cyber-attacks exploit human weaknesses?
      They take advantage of human gullibility
    • What is malware?
      Malicious software designed to cause harm
    • What is the function of antivirus software?
      To prevent malware from entering the system
    • What is ransomware?
      Software that prevents access to files until a ransom is paid
    • What is the purpose of spyware?
      To record actions and send data to a third party
    • How many viruses are created each day?
      Around 82,000 viruses
    • How do viruses spread?
      Through files, programs, or games that are downloaded
    • What distinguishes worms from viruses?
      Worms do not hide within other files
    • What are Trojan Horses in cybersecurity?
      Programs that pretend to be legitimate but are actually malware
    • What is social engineering in the context of cybersecurity?
      The manipulation of individuals to disclose private information
    • What is phishing?
      An email scam that directs users to fake websites
    • How can phishing be prevented?
      By implementing network policies and firewalls
    • What is pharming?
      A technique that redirects users to fake websites
    • How can pharming be prevented?
      By using anti-malware and firewalls
    • What is a brute force attack?
      A trial and error method to gain access to password systems
    • What is the purpose of encryption?
      To make data unreadable without a key
    • What is a DDoS attack?
      An attack that floods a server with excessive requests
    • What is SQL injection?
      A method that exploits web input forms to manipulate databases
    • What are the effects of a successful SQL injection attack?
      Bypassing authentication, executing queries, and altering data
    • What is an acceptable use policy (AUP)?
      A guideline detailing acceptable behavior on a network
    • What is penetration testing?
      A method to identify potential attack targets and entry points
    • What is the role of ethical hackers?
      To find system vulnerabilities before malicious hackers exploit them
    • What is the function of firewalls?
      To act as a barrier between attackers and the computer system
    • How do strong passwords help prevent brute force attacks?
      By making it difficult for attackers to guess passwords
    • What are biometric security measures?
      Security methods using physical characteristics like fingerprints
    • What is the purpose of user access levels?
      To restrict access to sensitive data based on user roles
    • How can poor network policy lead to security issues?
      By leaving users unaware of risks associated with their actions
    • What should a network manager ensure regarding user access?
      That users can only access facilities they need
    • What are the key components of a network policy?
      • Defines security rules and requirements
      • Outlines user access protocols
      • Ensures users have secure passwords
      • Regular backups and disaster recovery procedures
      • Maintenance of up-to-date security software
    • What are the strengths and weaknesses of different malware types?
      Strengths:
      • Viruses replicate and spread through files
      • Ransomware can encrypt data for ransom
      • Spyware collects sensitive information

      Weaknesses:
      • Malware can be detected by antivirus software
      • Users can be educated to avoid phishing
      • Firewalls can block unauthorized access
    See similar decks