1.4 Flashcards
What is malware?
- Software designed with malicious intent
- May disrupt, damage or gain unauthorised access
- To commit crimes such as fraud and identity theft
Which 2 forms of attack are examples of social engineering?
- Targeting weak people
- Phishing
What is weak people?
- Attempting to gain access by targeting people using the system rather than the technical aspects
- People are often the weakest security point in a computer system
What is phishing?
- Disguising as a trustworthy entity in emails
- To trick the user to reveal personal information
What is a brute force attack?
- Trial and error method to guess a password or a pin
- Attempting every possible solution until the correct one is found
- Automated software which generates a large number of consecutive guesses (not using intellectual strategy)
What is a denial of service attack?
- Flooding a server with useless traffic that it cannot handle
- Causes the server to become overloaded and unavailable to respond to actual client requests
What is data interception and theft?
- Unauthorised act of stealing computer-based information
- Attempting to access data whilst it is being transferred between devices over a network
- Intent of compromising sensitive information
What is SQL injection?
- Entering SQL code into a data input field on a website or database
- The code could run directly on the database, allowing the hacker to access/change/delete data
What threats do malware pose?
- Files are deleted, become corrupt or encrypted
- Internet connection becomes slow
- Keyboard inputs are logged and sent to hackers
- Computers crash, reboot randomly
- If client becomes infected with malware, it easily spreads across servers, which could affect the whole network
What threats do phishing pose?
- Accessing a victim’s account to withdraw money or make purchases
- Open bank accounts, credit cards
- Gain access to high value corporate data
What threats do brute force attacks pose?
- Theft of data
- Access to corporate systems
What threats do DoS pose?
- Loss of access to service for customers
- Lost revenue
- Lower productivity
- Damage to reputation (customers become victims of a data breach)
What threats do data inception and theft pose?
- Usernames and passwords compromised, allowing unauthorised access to systems
- Disclosure of corporate data
- Theft of data
What threats do SQL injection pose?
- Contents of database could be output, sensitive data could be revealed
- Data in the database can be amended or deleted
- New rogue records can be added to the database
Why are people a weak point?
- Carelessness = network vulnerabilities
- Not installing OS updates
- Not keeping anti-malware up to date
- Not locking doors
- Not logging off/locking computers
- Leaving printouts on desks
- Writing passwords down on sticky notes and attached to computers
- Sharing passwords
- Losing memory sticks/laptops
- Not applying security to wireless networks
- Not encrypting data
How can you protect against malware?
- Strong security software (firewall, spam filter, anti-virus, anti-spyware)
- Enabling software updates
- Staff training (cautious of opening attachments/downloading things)
- Backup files onto removable media (secondary storage)
- Avoid clicking on suspicious links
How can people not be weak?
- User training
- Strong passwords
- Two-factor authentication
How can you protect against phishing?
- Recognise suspicious emails
- Avoid clicking links or attachments in untrusted emails
- Verify the legitimacy of requests by contacting organisations
How can you protect against brute force attack?
- Strong passwords
- Limit login attempts
- Two-factor authentication
How can you protect against DoS attack?
- Continuous analysis of network traffic
- Firewalls
How can you protect against data interception and theft?
- Encryption
- Staff training (passwords, locking computers, logging off, using portable media)
- Investigating own network vulnerabilities (penetration testing)
How can you protect against SQL injection?
- Validation on input boxes
- Setting database permissions
- Penetration testing
What is penetration testing?
- Authorised hacking attempt
- Aim is to find errors in the system and report them to the system’s owner
- Allows security flaws to be fixed before the real hackers take advantage of them
What is anti-malware software?
- Attempts to detect, prevent and remove malware on a computer system
What are firewalls?
- Network security device
- Checks traffic passing through it against a set of rules
- Prevents traffic from unauthorised devices/use of protocols from passing through
What are user access levels?
- Controls which aspects of a system users can access
- Only allowed to access parts they need
- Prevention of accessing sensitive data/parts of the system deliberately/accidentally
What are passwords?
- Secret word or phrase provided along a username to control access a system
What is encryption?
- Scrambling data into cipher text so that it cannot be read/understood without first being decrpted
What is physical security?
- Securing the physical components of a system
- e.g. locking doors of server/computer rooms
What are viruses?
- Piece of code that inserts itself into an application and executes when the app is run
- Can steal sensitive data or launch DoS attacks or conduct ransomware attacks
What are worms?
- Targets vulnerabilities in operating systems to install themselves into networks
- Spreads through network through replication
- Can steal sensitive data or launch DoS attacks or conduct ransomware attacks
What are trojans?
- Disguised as desirable code
- Once downloaded, can take control of systems for malicious purposes
- Can be hidden in games, apps, email attachments
What is spyware?
- Collects user activity data without consent
- Includes passwords, pins, payment information
What is ransomware?
- Uses encryption to disable a target’s access to its data until a ransom is paid
What is adware?
- Tracks a user’s activity to determine which ads to display
- Erosion of user privacy: can create a profile of a certain person including who their friends are, their purchase history, where they have travelled, information can be shared or sold to advertisers
- Displays unwanted advertisements as a result
What is a keylogger?
- Monitors users’ keystrokes
- Allows keyloggers to steal passwords, banking information
- Inserted through phishing, social engineering, downloads