what is cyber security?
the different processes, practices and technologies that protect networks, computers, programs and data from attack, damage or unauthorised access
what kind of threats are computers vulnerable to?
why is it important to secure data?
what are password policies?
what are some examples of password policies?
what are default passwords? and why do they make devices vulnerable if not changed by the user?
threat; makes it easy for hackers to gain access using password lists or a brute force attack
what are default passwords? and why do they make devices vulnerable if not changed by the user?
threat; makes it easy for hackers to gain access using password lists or a brute force attack
what are user access levels?
why do misconfigured access rights serve as a threat?
threat; these give users too much access which they can then misuse
what is pharming?
a cyber attack that redirects a user to a fake website
how does a pharming attack take place?
if a hacker can change the entry on the DNS (domain name system) server, then they can make it point to a fake website that they can control, meaning the DNS server has been ‘poisoned’
→ the fake website might appear the same as a real website
→ its real aim is to collect personal data like bank details
→ the hacker can then use this to transfer money to themselves
what threat does a pharming attack pose?
a DNS server is compromised so that it points to a fake website which can then obtain personal information like usernames and passwords
what is removable media? and how can they be a threat??
any storage device that can be inserted and removed from a computer
how can malware get onto removable media?
threat; these can be used to introduce malware or remove confidential documents
why must software be regularly patched or updated?
what are the most important software updates?
threat; leaves security holes open
what is social engineering and what are some examples of this?
the ability to obtain confidential information by manipulating people for it
what is phishing?
using email or a text message to obtain information
- emails, texts or phone calls are sent to users pretending to be from a trustworthy organisation (like a bank or website)
- these messages attempt to gain things such as: usernames, passwords, credit card details and other info
what are the features of a phishing email?
what is shouldering?
what is blagging?
what is malware? and what are some types of malware?
malicious software; executable programs that run on a computer
what are viruses and what do they do?
what is a worm?