Save
Computer Science AQA
3.6 Cyber Security
Save
Share
Learn
Content
Leaderboard
Learn
Created by
🐌
Visit profile
Cards (41)
Blagging
(pretexting)
making up a
fake scenario
in order to gain
sensitive
information
Phishing
Using
SMS
/
Email
to try and
trick
people into giving up
personal information
Shouldering
Where someone
watches
,
records
or
remembers
a
victim
entering
security information
in order to gain access to
private data
Biometric
measure
using
fingerprints
,
facial recognition
etc that use the user's
physical features
to prove who they are
Email Verification
sends an
email
which requires a
valid email address
, and for the recipient to
respond
to
prove
the
email
and hence the user is
valid
CAPTCHA codes
distinguishing between a human and robot to prevent robots/programs from gaining accidental access
Computer Virus
Copies
itself to
spread
across a
computer
/
network
,
activated
when a user opens the
infected file
Adware
code embedded
or
attached
to the
program files
which will
persistently
show
adverts
Spyware
A program which records
data
such as
usernames
and
passwords
on a
host system
and
forwards
information to a
third
party
Security
process designed to
protect networks
or
data
Malware
computer software
or program with
malicious
,
hostile
or
intrusive
intent
What is a cyber security threat related to passwords?
A weak or default
password
is a cyber security threat.
What is the importance of network security?
Protects data from
unauthorized access
Ensures
reliable communication
Maintains
user privacy
What are the six main forms of cyber security threats?
Weak passwords
, outdated software, removable media,
malicious code
, misconfigured access rights, and
social engineering techniques
.
What is a weak password?
A password that is easy for
hackers
to crack.
Why is outdated software a cyber security threat?
It may be vulnerable to new
malware
threats.
What is malicious code?
Dangerous
software that causes harm to data and files.
What are the four main examples of malware?
Computer Virus
Adware
Trojans
Spyware
What is the function of a computer virus?
It copies
itself
to spread across a computer or network.
What does adware do?
It displays unwanted
advertisements
to users.
How do Trojans operate?
They disguise themselves as
legitimate
programs to cause damage.
What is the purpose of spyware?
To monitor
user activity
and steal
sensitive information
.
What are misconfigured access rights?
Incorrect access levels that allow
unauthorized
users to access data.
What are social engineering techniques?
Methods used to
manipulate
people into giving up information.
What are the four main forms of social engineering?
Blagging
Phishing
Pharming
Shouldering
What is blagging?
Making up fake scenarios to gain
sensitive
information.
What is phishing?
Using
SMS
or emails to trick people into giving up personal information.
What is pharming?
Redirecting
network traffic to a fake website.
What is shouldering?
Gaining access to
sensitive
data by looking over someone's shoulder.
What are methods to detect and prevent cyber threats?
Biometric measures
Email verification/
2FA
CAPTCHA codes
Automatic software updates
Password systems
Regular backups of data
Anti-malware software
Spam/Web filters
What is the purpose of biometric measures in cyber security?
To allow access to data and systems using
unique
physical traits.
What does email verification/2FA do?
It adds an extra level of
confirmation
to verify a user's identity.
What is the function of CAPTCHA codes?
To distinguish between a
human
and a
robot
to prevent unauthorized access.
Why are automatic software updates important?
They protect against the
latest threats
and
patch
any bugs.
What is the purpose of password systems in cyber security?
To restrict
unauthorized
users from accessing data and systems.
Why are regular backups of data important?
They allow data to be restored if
breached
or lost.
What does anti-malware software do?
It
protects
data
and
systems
by
blocking
and
quarantining malware.
What is the function of spam/web filters?
To
automatically
block or delete spam emails and dangerous websites.
What is cyber security?
Processes
,
practices
, and
technologies
Designed to protect networks, computers, programs, and data
Aims to
prevent
attack,
damage
, or
unauthorized
access
What is penetration testing?
Attempting to gain access to resources to identify
vulnerabilities
.
See all 41 cards