cyber security

?
What is penetration testing
When organisations employ specialists to stimulate potential attacks to their system to prevent attacks
1 of 15
What is white box penetration
White box penetration testing stimulates a malicious insider who has knowledge of the current system
2 of 15
What is black box penetration
Black box penetration testing stimulates an external cyber attack.
3 of 15
What is malware
Software designed to cause harm or gain unauthorised access to a computer system
4 of 15
What is a virus
Software that damages or deletes data by copying itself and spreading to other computers. This is caused when uses open infected files.
5 of 15
What is a trojans
Malware that is hidden in seemingly harmless software. They remain inactive until the program is run by the user. It deletes or damages data
6 of 15
What is spywre
Tracks user activities and send personal information using key logging which can be sold to 3rd parties
7 of 15
What is adware
It automatically downloads and displays advertisements without permission. It can direct them to unwanted websites
8 of 15
What is social engineering
A way of gaining sensitive info by influencing people
9 of 15
What is pharming
Where users create fake versions of websites for users to enter their personal info
10 of 15
What is phishing
Where users text/email people as a well known business to lead them to fake websites
11 of 15
What is shouldering
When people observe a persons activity to see them input personal info
12 of 15
What is blagging
When a person makes up a story to persuade a person to give up personal info
13 of 15
How can networks be protected against threats(5)
Encryption, Anti-malware software, Auto updates, user access levels, MAC address filtering
14 of 15
Methods of authentication (4)
Passwords, Bio-metrics, CAPTCHA, Email confirmation
15 of 15

Other cards in this set

Card 2

Front

What is white box penetration

Back

White box penetration testing stimulates a malicious insider who has knowledge of the current system

Card 3

Front

What is black box penetration

Back

Preview of the front of card 3

Card 4

Front

What is malware

Back

Preview of the front of card 4

Card 5

Front

What is a virus

Back

Preview of the front of card 5
View more cards

Comments

No comments have yet been made

Similar Computing resources:

See all Computing resources »See all Cyber Security resources »