3.6 Cyber Security

Cards (41)

  • Blagging (pretexting)

    making up a fake scenario in order to gain sensitive information
  • Phishing
    Using SMS/Email to try and trick people into giving up personal information
  • Shouldering
    Where someone watches, records or remembers a victim entering security information in order to gain access to private data
  • Biometric measure

    using fingerprints, facial recognition etc that use the user's physical features to prove who they are
  • Email Verification
    sends an email which requires a valid email address, and for the recipient to respond to prove the email and hence the user is valid
  • CAPTCHA codes
    distinguishing between a human and robot to prevent robots/programs from gaining accidental access
  • Computer Virus
    Copies itself to spread across a computer/network, activated when a user opens the infected file
  • Adware
    code embedded or attached to the program files which will persistently show adverts
  • Spyware
    A program which records data such as usernames and passwords on a host system and forwards information to a third party
  • Security
    process designed to protect networks or data
  • Malware
    computer software or program with malicious, hostile or intrusive intent
  • What is a cyber security threat related to passwords?
    A weak or default password is a cyber security threat.
  • What is the importance of network security?
    • Protects data from unauthorized access
    • Ensures reliable communication
    • Maintains user privacy
  • What are the six main forms of cyber security threats?
    Weak passwords, outdated software, removable media, malicious code, misconfigured access rights, and social engineering techniques.
  • What is a weak password?
    A password that is easy for hackers to crack.
  • Why is outdated software a cyber security threat?
    It may be vulnerable to new malware threats.
  • What is malicious code?
    Dangerous software that causes harm to data and files.
  • What are the four main examples of malware?
    • Computer Virus
    • Adware
    • Trojans
    • Spyware
  • What is the function of a computer virus?
    It copies itself to spread across a computer or network.
  • What does adware do?
    It displays unwanted advertisements to users.
  • How do Trojans operate?
    They disguise themselves as legitimate programs to cause damage.
  • What is the purpose of spyware?
    To monitor user activity and steal sensitive information.
  • What are misconfigured access rights?
    Incorrect access levels that allow unauthorized users to access data.
  • What are social engineering techniques?
    Methods used to manipulate people into giving up information.
  • What are the four main forms of social engineering?
    • Blagging
    • Phishing
    • Pharming
    • Shouldering
  • What is blagging?
    Making up fake scenarios to gain sensitive information.
  • What is phishing?
    Using SMS or emails to trick people into giving up personal information.
  • What is pharming?
    Redirecting network traffic to a fake website.
  • What is shouldering?
    Gaining access to sensitive data by looking over someone's shoulder.
  • What are methods to detect and prevent cyber threats?
    • Biometric measures
    • Email verification/2FA
    • CAPTCHA codes
    • Automatic software updates
    • Password systems
    • Regular backups of data
    • Anti-malware software
    • Spam/Web filters
  • What is the purpose of biometric measures in cyber security?
    To allow access to data and systems using unique physical traits.
  • What does email verification/2FA do?
    It adds an extra level of confirmation to verify a user's identity.
  • What is the function of CAPTCHA codes?
    To distinguish between a human and a robot to prevent unauthorized access.
  • Why are automatic software updates important?
    They protect against the latest threats and patch any bugs.
  • What is the purpose of password systems in cyber security?
    To restrict unauthorized users from accessing data and systems.
  • Why are regular backups of data important?
    They allow data to be restored if breached or lost.
  • What does anti-malware software do?
    It protects data and systems by blocking and quarantining malware.
  • What is the function of spam/web filters?
    To automatically block or delete spam emails and dangerous websites.
  • What is cyber security?
    • Processes, practices, and technologies
    • Designed to protect networks, computers, programs, and data
    • Aims to prevent attack, damage, or unauthorized access
  • What is penetration testing?
    Attempting to gain access to resources to identify vulnerabilities.