1.4 Flashcards
What is a network attack?
An attempt to gain access to steal,modify or delete data on a network
What is malware? Name the 5 types of malware
a malicious software designed to hack a system- virus ,trojan, spyware ,ransomware ,worm
What is a virus?
Programs embedded in other files which replicate themselves to become part of other programs
What is a worm?
Like viruses but not hidden within files- they’re often spread via emails
What is spyware?
Programs that monitor user activity like webs visited or usernames and passwords- this information is then sent back to the hacker
What is a trojan?
Programs that pretend to be legitimate but are actually malware- often pretend to be email attachments
What is ransomware?
Programs that blackmail a user to make a payment to the hacker
What is social engineering?
Manipulation of people in order to make them perform desired actions to gain information
What is phishing?
A phisher sends emails that look legitimate asking for a verification but usually contain a fraudulent link which asks for personal information.
What’s the name of a phishing attack over the phone?
vishing
What is baiting?
In baiting- the victim is lured into a trick of the promise of an item (i.e music for free or downloads)
What is Quid Pro Quo?
Promises an exchange for information that they do not have authorisation to but the information tends to be exchanged for a service NOT an item
What is tailgating/piggybacking?
When somebody(without proper authorisation) follows someone without proper authorisation
What is a Brute Force Attack? How can we make these attacks harder to carry out?
Using trial and error to guess a password (often using a program) by using all possible combinations until the correct one is obtained ——- using complex passwords with lots of character combinations
What is hacking?
Gaining unauthorised access to data in a system
What is Denial of Service? And distributed denial of service?
An attack where the aim is to prevent anyone using the resources e.g. lots of bots (computers) will form a botnet and will bombard a website with too many requests so that it crashes and prevents a server from carrying out its function
What is Data Interception?
Data accessed en route i.e. by packet sniffing software