3.6 Cyber security

Cards (360)

  • Anti-virus software scans devices for viruses and removes them if found.
  • Malware can be installed on your device by clicking on links or downloading files from the internet, opening email attachments, using unlicensed software, or connecting an infected USB drive.
  • A virus is malicious code that spreads from one computer to another.
  • Firewalls are used to prevent unauthorised access to networks by blocking incoming traffic from the internet that does not meet predetermined criteria.
  • Trojan horse programs are disguised as useful applications but contain hidden malicious code.
  • Spyware monitors user activity and sends information back to its creator.
  • Password policies ensure strong passwords are created and changed regularly.
  • Worms replicate themselves across networks without human intervention.
  • Firewalls are used to prevent unauthorized access to a network.
  • Encryption is the process of converting data into an unreadable format using complex algorithms, making it difficult for attackers to read or steal sensitive information.
  • A firewall is a hardware or software system that monitors incoming and outgoing traffic based on predetermined rules.
  • To protect against malware, use anti-malware software, keep it up to date, avoid suspicious websites, emails, and attachments, only install licensed software, and scan any new external storage devices with antivirus software.
  • Intrusion detection systems (IDS) monitor network activity and alert administrators when suspicious behaviour occurs.
  • Spyware monitors user activity without their knowledge and sends information back to its creator.
  • Encryption converts data into a secret code so it cannot be read without decrypting it with a key.
  • Data loss prevention (DLP) tools scan data as it enters or leaves a system to detect sensitive information and block its transmission unless authorised.
  • Adware displays unwanted adverts on websites visited by users.
  • Adware displays unwanted adverts on websites visited by users.
  • Anti-virus software detects viruses on computers and removes them.
  • Encryption converts data into coded form so it cannot be read without decoding.
  • Ransomware encrypts data on a victim's device until they pay money to unlock it.
  • Encryption converts data into an unreadable format using complex algorithms, making it difficult for attackers to read or steal.
  • Antivirus software is installed on computers to detect and remove viruses.
  • Data backup involves copying important files onto external storage devices such as USB drives or cloud services like Google Drive.
  • Encryption converts data into an unreadable format using complex algorithms, making it difficult for attackers to read or steal sensitive information.
  • Data backup involves copying important data onto other storage media such as CD/DVD, external hard drives, cloud services, or network attached storage (NAS).
  • Antivirus software scans files for known viruses and removes them from infected systems.
  • Data backup involves creating copies of important data on separate devices to protect against loss due to hardware failure or cyber attacks.
  • Access control systems restrict access to resources based on authorized users' identities.
  • Antivirus software scans files and programs for known viruses and malware, removing them if found.
  • Access control limits who can access specific resources within a system based on their level of authorization.
  • Anti-virus software scans files for known viruses and removes them if found.
  • Social engineering involves tricking people into revealing confidential information through deception.
  • Anti-spyware software can be installed to detect and remove spyware from your computer.
  • Data backup involves creating copies of important data to protect against loss due to accidents, theft, or other incidents.
  • Social engineering attacks involve tricking people into revealing confidential information through phishing emails, phone calls, or fake websites.
  • Access control systems limit access to specific areas or resources within a computer system or network.
  • Pharming involves redirecting users from legitimate websites to fraudulent ones by changing DNS settings.
  • Anti-virus software scans files for viruses and removes them if found.
  • Phishing attacks involve sending fake emails from reputable sources to trick users into providing personal details.