computer science. cyber security
what is cyber security? - answer a set of measures that are taken to protect a computer
from harm to its data or software.
what is a cyber-attack? - answer an attempt to gain unauthorized access to or control of
a computer and the network.
what is the reason for cyber security? - answer- to prevent data loss of important
information
- to prevent data from being manipulated
why are weak and non-default passwords a cyber security threat? - answer- not using a
default password can lead to your password being too easy to guess, so hackers can
access your private information
- if your hacker guesses a password to one account, they can easily access your other
accounts too if they have the same password
why are misconfigured access rights a cyber security threat? - answer- each user is
assigned access rights in any organisation according to their role, and if these rights
aren't managed correctly, they can allow people into areas which they should not have
access to
- if a user has unintentional access to confidential pages, then a hacker who gains
access to their computer or account can cause damage
why are removable media a cyber security threat? - answer- removable media such as
removable hard drives can cause data theft and virus infection
- if a computer does not have proper virus protection then the memory stick could
become infected and infect a whole network
- data in that network then becomes vulnerable and can be stolen
what is social engineering? - answersocial engineering is the art of manipulating people
so they divulge personal information such as passwords.
what is the general thing that can be done to protect against social engineering? -
answer- downloading softwares that can check if websites or links are genuine
- making sure your login details are extremely private and secure, both in real life and
online
how does blagging work? - answer- blagging is the act of knowingly or recklessly
obtaining and disclosing personal data without the consent of the controller
- e.g, someone could persuade an employee to give them private information,
pretending it is needed for something else
what is cyber security? - answer a set of measures that are taken to protect a computer
from harm to its data or software.
what is a cyber-attack? - answer an attempt to gain unauthorized access to or control of
a computer and the network.
what is the reason for cyber security? - answer- to prevent data loss of important
information
- to prevent data from being manipulated
why are weak and non-default passwords a cyber security threat? - answer- not using a
default password can lead to your password being too easy to guess, so hackers can
access your private information
- if your hacker guesses a password to one account, they can easily access your other
accounts too if they have the same password
why are misconfigured access rights a cyber security threat? - answer- each user is
assigned access rights in any organisation according to their role, and if these rights
aren't managed correctly, they can allow people into areas which they should not have
access to
- if a user has unintentional access to confidential pages, then a hacker who gains
access to their computer or account can cause damage
why are removable media a cyber security threat? - answer- removable media such as
removable hard drives can cause data theft and virus infection
- if a computer does not have proper virus protection then the memory stick could
become infected and infect a whole network
- data in that network then becomes vulnerable and can be stolen
what is social engineering? - answersocial engineering is the art of manipulating people
so they divulge personal information such as passwords.
what is the general thing that can be done to protect against social engineering? -
answer- downloading softwares that can check if websites or links are genuine
- making sure your login details are extremely private and secure, both in real life and
online
how does blagging work? - answer- blagging is the act of knowingly or recklessly
obtaining and disclosing personal data without the consent of the controller
- e.g, someone could persuade an employee to give them private information,
pretending it is needed for something else