Created by Sam Houghton
about 8 years ago
|
||
Question | Answer |
What is Phishing? | A phishing email is one that tricks you into handing over sensitive or personal information (login details, bank details, etc.) |
What is Shoulder surfing? | Shouldering involves direct observation of a user entering their security details |
What are Brute force attacks? (Passwords) | In a brute force attack, a hacker may go through a list of different passwords until access to an account is gained Alternatively, the attacker may try every combination of characters until the correct password is found |
Tips on Setting a secure password? | You should never include your name, DOB or personal details Validation checks on a new password may specify that it must be: between 10 and 15 characters (length check) a mixture of numbers, lower and uppercase characters and symbols (format check) Change default passwords |
What are Viruses? | A computer virus is one type of malware (malicious software) which is installed without your knowledge, with the purpose of doing harm A virus is a program which infects (embeds itself in) other programs or data files It is easily spread if a user innocently sends an infected file to someone else |
What are Worms? | A worm is another type of malware It is a standalone program that does need to attach itself to an existing program in order to spread It may scan the Internet looking for vulnerable computersto infect |
Dangers of USB sticks? | Criminals sometimes leave a USB stick contaminated with a virus lying, for example, in the car park of a company that they wish to infect with a virus or steal data from |
How can you minimize the risk of Viruses on Removable media? | Scan all devices, never use a found device and disable the autorun facility for removable media |
What is Eavesdropping? | “Eavesdropping” is used to intercept data packets as they move across networks Packets are inspected for useful data that could be misused or sold |
What is Digital stalking? | Hackers can use your mobile device to access detailed information about your daily life While you browse Facebook on your smartphone, someone could be tracking your every move, determining your GPS coordinates, the direction you are walking in and how fast you’re walking |
Ideas to Protect your mobile phone? | Use the password feature and choose a strong password Do not follow links in suspicious emails Think carefully before posting your mobile phone number on public websites Don’t install apps without researching them first – if they require extra permissions, don’t install them Delete all information stored on your mobile before discarding |
What is a Denial of Service attack? | A DoS attack attempts to flood a website server with an overwhelming number of data requests It may flood the victim’s site with spam emails (an “email bomb”) or disrupt access to a victim’s website or entire geographical area by reconfiguring software to crash network sites |
What is SQL injection? | SQL is a database query language SQL injection takes advantage of web input forms to access or destroy data SQL commands can be input into web forms instead of the expected ‘real’ data This can be interpreted by vulnerable web applications as an additional instruction to operate in the hacker’s favour |
What is An Acceptable Use Policy ? | An Acceptable Use Policy details strict guidelines about what is and is not acceptable behaviour on a network All employees or students should be asked to read and sign this |
Want to create your own Flashcards for free with GoConqr? Learn more.