Unit 6 - Cyber Security

What is Cyber Security?
Cyber Security consists of the processes, practices and technologies designed to protect networks, computers, programs and data from attack, damage or unauthorised access.
1 of 28
What is Penetration Testing?
Penetration Testing is the practice of deliberately trying to find security holes in your own systems.
2 of 28
What is the goal of Penetration Testing?
The aim is to identify the targets of potential attacks, identify possible entry points, attempt to break in and report back the findings.
3 of 28
What is Black Box Testing?
The testers are given no more information than any potential hacker may have.
4 of 28
What is White Box Testing?
The testers are given as much information as an 'insider' may have, in order to determine how much damage a rogue employee could do to a system.
5 of 28
What are White Hat hackers?
They are ethical hackers employed to put their expertise to good in finding system vulnerabilities before 'black-hats' abuse them, they are usually employed by companies or security firms.
6 of 28
What are Grey Hat hackers?
They fall somewhere in between black and white hats. They will frequently seek out vulnerabilities without authorisation from the system owners. Any flaws that they find may either be reported for a ransom fee or broadcast on the internet.
7 of 28
What is Social Engineering?
Social Engineering is the art of manipulating or 'conning' individuals into giving away private information such as login IDs, passwords or bank account details.
8 of 28
Name 4 common techniques of Social Engineering.
Phishing, Pharming, Blagging and Shoulder Surfing.
9 of 28
Describe Phishing.
A phishing email is one that tricks you into handing over sensitive or personal information e.g login details or bank details.
10 of 28
Describe Shoulder Surfing.
Shoulder Surfing involves direct observation of a user entering their security details.
11 of 28
Describe Pharming.
Pharming is when instead of using a phony link in an email, pharming redirects a website's traffic to a bogus site even if the user has typed the correct web address.
12 of 28
Describe Blagging.
Blagging is the act of creating and using an invented scenario to engage a targeted victim in a manner that increases the chance the victim will divulge information or perform actions that would be unlikely in ordinary circumstances.
13 of 28
What is Malware?
Malware is the term used to refer to a variety of hostile or intrusive software.
14 of 28
What is a Virus?
A virus is one type of malware which is installed without your knowledge with the purpose of doing harm.
15 of 28
What is a Trojan Horse?
A Trojan Horse tricks users into accepting it. Once installed it may open a 'back door' into your computer system through which your personal information can be harvested.
16 of 28
What is a Worm?
A worm is a standalone program that doesn't need to attach itself to an existing program in order to spread.
17 of 28
What is Spyware?
Spyware is software that gathers information about a person or organisation without their knowledge.
18 of 28
What is Adware?
Adware is a form of Spyware that isn't illegal. It analyses the sites that a user visits and then prevents adverts for products the user is likely to be interested in.
19 of 28
How do systems become infected?
Technical weaknesses in a computer or a network can open the door to cyber-crime. Common sources and forms of attack include unpatched software, USB devices, digital devices and eavesdropping.
20 of 28
Describe Software Patches.
Software Patches are updates to a program to improve or fix a bug and offers extra protection against malware.
21 of 28
How do you protect against viruses?
Install anti-virus software, don't insert a foreign USB device and check that websites are legitimate and safe.
22 of 28
What is Removable Media?
Removable Media is portable data storage. However is poses two significant security issues which are infection from viruses and data loss or theft.
23 of 28
Describe Data Theft.
Data theft can have many different types. Types of data that can be stolen are addresses, telephone number and email addresses.
24 of 28
What is the best way to set a secure password?
Use a minimum of eight characters, mixture of upper and lower case letters, numbers, special characters and don't include your personal details.
25 of 28
What is Authentication?
Authentication checks that the user is allowed to access content. It can be a pin pattern or password.
26 of 28
What does CAPTCHA stand for?
It stands for 'Completely Automated Public Turing Test to tell Computers and Humans Apart'.
27 of 28
Describe CAPTCHA.
The user is required to decipher and type in the text shown in a distorted way unreadable by a computer. It prevents Spam Bots from signing up to an internet service.
28 of 28

Other cards in this set

Card 2


What is Penetration Testing?


Penetration Testing is the practice of deliberately trying to find security holes in your own systems.

Card 3


What is the goal of Penetration Testing?


Preview of the front of card 3

Card 4


What is Black Box Testing?


Preview of the front of card 4

Card 5


What is White Box Testing?


Preview of the front of card 5
View more cards


No comments have yet been made

Similar Computing resources:

See all Computing resources »See all Cyber Security resources »