Cheatography
https://cheatography.com
What is 'cyber security'?Methods and technologies designed to protect networks, computers and data from attack, damage and unauthorised access. |
ThreatsWeak/default passwords | These are easily guessed or found through brute force decryption. | Misconfigured access rights | This means that systems/files that should be secure can be accessed by other users. | Removable media (e.g. USBs) | This can bypass security measures (like firewalls), so malware can be installed more easily. | Outdated software | Software that has not been patched is vulnerable to attackers. |
In addition to this, malicious code and social engineering techniques also pose threats.
| | Methods of ProtectionIdentity authentication: biometric, passwords, two-step authentication | CAPTCHA (human or robot test) | Anti-Virus software (keep up-to-date) | Updating software and installing patches |
Social EngineeringSocial engineering | The process of manipulating people into undertaking certain actions or disclosing confidential information. | Blagging or Pretexting | Creating a fictional scenario in order to obtain a user’s personal information, then using this information for malicious purposes. | Phishing | Contacting users (usually through fraudulent emails that mimic a legitimate organisations) to cause users to disclose personal information (e.g. usernames, passwords) | Pharming | Setting up and guiding users to a bogus website that is visually identical to a legitimate one, allowing the attacker to gain login details. | Shouldering or Shoulder surfing | Spying’ on people, usually while they’re logging in to accounts or using an ATM, to find sensitive information (e.g. passwords, PINs). |
| | Penetration TestingWhat is penetration testing? Attempting to gain access to resources without knowledge of login details and other normal means of access, in order to test defences. | What is the difference between black-box and white-box penetration testing? White-box penetration is where the tester already has some knowledge of the target system. This simulates an attack by a malicious insider. Black-box is where they have no prior knowledge. This simulates external hacking or cyber warfare. |
MalwareMalware | Dangerous or intrusive software. | Virus | Malicious program that duplicates itself once inside a computer or network. | Trojan | A malicious program disguised as a legitimate one to trick users into installing it. | Spyware | Software enabling attackers to obtain information about another's computer activities by transmitting data from their hard drive. | Ad ware | Software that automatically displays advertisments when a user is online, generating revenue for the attacker. |
|
Created By
Metadata
Favourited By
Comments
No comments yet. Add yours below!
Add a Comment
Related Cheat Sheets
More Cheat Sheets by [deleted]