Cyber Security

Ace your homework & exams now with Quizwiz!

What are biometrics? What are they used for?

A measure of human characteristics such as fingerprint patterns. They are used to identify and verify a user's identity before they given access to parts of a network / computer.

What is a MAC address?

A physical address embedded into the network adapter which cannot be changed.

What is an access right?

A privilege which dictates what actions on a network a user can take.

What is adware?

A type of malware which automatically generates unwanted adverts to generate revenue for the creator - such as pop - up ads. They are harmless by themselves, but there are types of adware which contain malicious spyware which can be used by the creator to steal confidential information such as passwords.

What is spyware?

A type of malware which tracks user actions such as keys typed using a keyboard, and sends this data to the creator. In turn, confidential information such as passwords and bank account details can be stolen.

How can user access levels control security?

A user access levels control how much access to data on a network a certain user has. They limit the number of people with access to private or confidential data, thus reducing the risk of an internal attack from the organisation.

What is one thing that needs to be ensured in terms of anti-malware software for it to actually be effective?

Anti-malware software must be regularly updated in order to ensure that it is able to detect all types of the malware it is designed to detect. IT MUST ALWAYS BE UP-TO-DATE.

What is the purpose of antivirus software?

Antivirus software is a type of software which detects and prevents malware from both entering the network / computer and also prevents malware from causing damage to a network / computer.

What is malware?

Any hostile or instrusive software which can attack or steal information from an information system.

What is malicious code? Why is it dangerous?

Code which contains malware, backdoors, logic bombs etc. Once the code is executed, the malware is also executed and so can cause damage or steal information from the computer.

What is user authentication?

Confirming the identity of a user before they are allowed access to data and certain parts of a network or computer.

Define cybersecurity.

Cyber security is means and methods protection of information systems [networks, computers and programs] from damage, theft, and unauthorized access.

What are passwords used for? What does a strong password contain?

For user authentication before a user is allowed access to parts of a network or computer. Strong passwords contain a large length and a mix of numbers, characters and symbols, in random order.

What does CAPTCHA do?

It determines whether a user is a human or robot, and aims to prevent a robot from doing automatic tasks such as creating spam accounts or gaining access to a network. It consists of a simple, only human - performable task.

What are Trojans?

Malicious software that is disguised as legitimate, desirable software. Trojans don't replicate themselves - users install them without realising their true purpose.

What is MAC address filtering?

Only allowing trusted users to enter a network by blocking devices with an untrusted MAC address trying to gain access.

What is unpatched software?

Outdated software containing security holes which are weaknesses in security that can be exploited by malware.

Why is outdated software, especially antivirus, a problem?

Outdated software is not upgraded and so will have security holes which can be exploited by the malware. Hence the software must also be upgraded to minimise risk of attack.

What are the problems with misconfigured access rights?

People are given permission to access certain parts of a network / computer that they should not be able to (like a student accessing a teacher account)

What is pharming?

Pharming is a cyberattack which redirects a website's traffic to a fake site, where any information entered by victims can be stolen.

What is encryption?

Scrambling and making data secret such that only authorised users can decrypt the data using a key. It prevents unauthorised users from viewing the data. Scrambled data is known as ciphertext.

What is blagging?

The process of inventing a fake scenario with the aim of engaging the victim and manipulating the victim into giving out confidential information that they would not normally. Example - the Nigerian Prince.

What is phishing?

The process of sending out fake external links [emails or texts] to thousands of people in the hope that one person falls victim. These emails will claim to be from reputable sources such as banks and will demand information such as account numbers.

What is social engineering?

The process or means of manipulating people to give up confidential and private information. It capitalises on the fact that humans are often the weakest point in security on a system.

What do viruses do?

They insert themselves into normal programs, and so when the host program is executed so is the virus. The virus then rapidly replicates and infects the computer system.

What do firewalls do?

They only allow authorised connections from entering or leaving a network by monitoring and filtering packets entering and leaving a network based on rules.

What is the use of email confirmation?

To ensure that the user is an actual person and not a robot.

What are worms?

Types of malware which can enter a network through unpatched software, exploiting security patches. It then rapidly self replicates and infects it's host computer.

What is shouldering?

Viewing a person's private information without their express consent - for example over their shoulder.

What is penetration testing?

Where an organisation hires external specialists and gives them the appropriate credentials and information to simulate a cyberattack on the company's network. The results are then reported back to the company, who can fix any security holes.

What is the difference between white and black box pen testing?

White box: Simulates a cyberattack on the network by a malicious insider. Thus the specialists are given user credentials and knowledge of the network to see what they can do with it. Black box: Simulates a cyberattack on the network by an 3rd external party. Thus the specialists are given no user credentials and knowledge of the network and try all methods possible to hack the organisation's network.

Give one difference between worms and viruses.

Worms can enter a network without being downloaded through unpatched software and unlike viruses, they can rapidly self - replicate without a host.


Related study sets