1. What can viruses affect?
2. How do hackers use viruses?
3. Sending requests to a single server using hijacked machines is:
4. Social engineering, phishing and worms are examples of:
5. Data travels across networks in ….
6. A network of computers infected with malicious software and controlled as part of a group without the owner's knowledge is:
7. Network forensics typically involves the examination of data sent across a network
8. This is software that provides a 'barrier' between a potential hacker and the computer system
9. These define access permissions for a user (pertaining to a network)
10. Additional security requirements to use alongside passwords could include:
11. Encryption is a method of bypassing viruses and ensuring that code is stored as plain text securely.
12. Typically, what level of access what a student have to the network, in a school?
13. They are side effects of the freedom and ease of communicating online and therefore…
14. An example of social engineering is:
15. A example of a network policy that may help with security is:
16. Malware is a manufacturer of corrupt (but cheap) computer parts
20. Networks like the internet are wonderful inventions and they are risk-free and completely safe.
21. The security that is associated with networks and particularly the internet is called:
22. One method of data interception is:
23. Pharming is terrifying because the email can be legitimate but clicking on the link takes you to a hacker's website. How?
24. ____________ is when the perpetrator obtains information while watching you use the device they want access to.
25. Baiting is like the real-world Trojan horse that uses physical media and relies on the _____________ of the victim
26. Organisations can reduce their security risks by:
27. An example of blagging is a hacker calling a company and pretending to be their network manager.
28. The attacks used in social engineering can be used to steal employees' confidential information. One common type of social engineering …
29. Another example of social engineering is a criminal posing as exterminators, fire marshals and technicians to go unnoticed and…
30. Spyware are programs that inject adverts into pages and programs on your computer with the aim that the hacker gets advertising revenue
31. Spyware gathers data about people without their knowledge, including sensitive data like passwords
32. You can minimise the risk of malware by:
33. Some spyware can even use your laptop or comptuer's webcam without your knowledge!
34. The following list are methods that ….
35. A common form of biometric security scanning used in school canteens and mobile phones is:
36. A longer password is always better in terms of a hacker being able to brute force hack it.
37. It is perfectly okay to communicate with strangers online so long as you only give them your phone number (and not your home address)
38. In Cyber security the term "Resilience" refers to the ability of IT systems to recover from attack
39. Cyber crime refers to any crime that involves computers and networks
40. What does the term 'cyber' refer to?