Created by Isaac Quinn
almost 8 years ago
|
||
Question | Answer |
What weaknesses does cyber crime exploit? | Human, technological. |
What is social engineering? | Social engineering is the art of conning people into giving you private information e.g. passwords and login IDs. Two common techniques are: Phishing, Shoulder surfing. |
What is phishing? | A phishing email is something that tricks you into giving away sensitive details away because of an official looking email. |
How can you tell is it's a phishing email? | It is often vague in its greeting e.g. Hello valued customer. Its often a variation of a real email address. The link it gets you visit is a slightly changed real one. It asks for personal information. It has a sense of urgency to make you think less about it. Its has poor SPaG. |
What is shoulder surfing? | Shoulder surfing is directly looking at the user entering security details. |
What is a Brute-Force-Attack? | A Brute-Force-Attack is a hacker trying either a list passwords or trying every combination of characters till a correct password is found. |
List three things never to include on a password. | Name ,DOB or personal details e.g. Pet's name. |
What does technical weakness leave a computer vunerable to? | Malware, Dos attacks and data interception and theft. |
What is a virus? | A piece of malware that installs its self on a PC with the intent of doing harm its embeds itself to other files that get sent through the networks. |
What is a worm? | A worm is a standalone piece of malware that scans the internet for other vulnerable computers to infect. It doesn't need other programs to spread. |
What leaves a computer techincally weak? | USB devices, digital devices, eavesdropping. |
Explain why you should not put found USB sticks in your PC. | Criminals sometimes leave infected USB sticks so that people who work for companies they wish to damage. People insert it in to their computer to find who owns it and it is on the network. |
How can you minimise probles with a USB stroage devices? | Scan it for viruses and don't leave auto open programs active. |
What is penertration testing? | The goal is o find weaknesses in your security system and fix them. |
Name and explain he two types of box tesing. | Black box testing gives testers no more information than a potential hacker. White box testing is when testers are given as much information as an insider to see what a rouge employee could do. |
Name the three types of hackers | White hat, Grey hat and Black hat. |
What do each of the three hacker types do? | White hats find vulnerabilities and tell the comply about they before they are exploited. Black hats find and exploit weaknesses. Grey hats are in the middle finding and ransoming weaknesses or revealing to everyone them but not doing anything themselves. |
What is a Audit trail? | It is information that is commonly recorded to use for maintaining security by finding out who, what, why, when, where and how something happened. They can be used in network forensics to solve data mysteries like police forensics. |
Whats a network policy? | A thing employees/students have to sign before using a computer at a site to stop bad actions taking place and to set behavioral standards. |
Name some rules for setting passwords. | Use min 8 characters. Use numbers lower and upper case. Use symbols like '#'. Don't use DOB name or personal things. Make it memorable to you |
How else can you protect data? | Anti-malware/Anti-spyware software to get rid of malware in your computer. Firewalls to protect your PC from hackers. |
What are access levels? | Access levels are rights to individual disks folders or files. |
What are the two types of system software? | System software and Application software. |
Whats are the three types of system software? | Operating system, Utility programs and Program Translators. |
Name 7 types of Operating systems. | Android OS, OS X (Apple MACs), iOS, MS-DOS, Google Chrome OS(based on Linux), Linux, Red Star(North Korean system based off Linux is used for propaganda and a sense of freedom) and Windows. |
Define Operating System. | "Software that... manages a computer's hardware and provides a user interface" |
What are the functions of an operating system? | To provide a user interface ad manage; memory, multitasking, peripherals, files and user access rights. |
What types of user interface are there? | GUI, Menu-driven interface, CLI, Voice activated and Real-time. |
What is WIMP? | WIMP is a GUI user interface that stands for: Windows, Icons, Menus and Pointers. |
What is a hardware Interrupt? | It is hardware out of a computer interrupting the CPU and telling it t run a different instruction. Software interrupts do this to but is from software. |
What does Encrytion software do? | Encrypts things. |
What is file management and trasfer? | Moving, copying and deleting folders and files. |
What is file defragmentation? | When a file is fragmented parts of it are split up as they could not fit together when a disk is defragmented it is basically reorganized so all the files are together this is done because split up files launch slower. |
What does compression software doe and why? | Compression software makes files smaller to reduce bandwidth use or achieve strict files size limits for emails etc. |
Why do people backup? | To make sure they don't lose files and for companies money. |
What are the two backup methods and what do they do? | Full backup; complete backup, Incremental backup; only changes since the last backup but is faster. |
Want to create your own Flashcards for free with GoConqr? Learn more.