1.4 Malware and protection Flashcards

1
Q

What is malware

A

Any software that has been created with malicious intent to cause harm to a computer system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Virus

A

A program which can replicate itself on a user’s computer. It contains code that will cause unwanted and unexpected events to occur

Examples of issues a user may experience are:
* Corrupt files
* Delete data
* Prevent applications from running correctly

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Worms

A

Worms are very similar to viruses, with the main difference being that they will spread to other drives and computers on the network

Worms can infect other computers from:
* Infected websites
* Instant message services
* Email
* Network connection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Trojan

A

Trojans disguise themselves as legitimate software but contain malicious code in the background

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Spyware

A

Software which will allow a person to spy on the users’ activities on their devices

This form of software will be embedded into other software such as games or programs that have been downloaded from illegitimate sources

Spyware can record your screen, log your keystrokes to gain access to passwords and more

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Ransomware

A

A form of malware that locks your computer or device and encrypts your documents and other important files

Often a demand is made for money to receive the password that will allow the user to decrypt the files

There is no guarantee paying the ransom will result in the user getting their data back

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is social engineering

A

Social engineering is exploiting weaknesses in a computer system by targeting the people that use or have access to them

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Phishing

A

Sending fraudulent emails to a large number of email addresses, claiming to be from a reputable company or trusted source to try and gain access to your details, often by coaxing the user to click on a login button

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Brute force attack

A

A brute force attack works by an attacker repeatedly trying multiple combinations of a user’s password to try and gain unauthorised access to their accounts or devices

A second form of this attack, commonly used for passwords is a dictionary attack
This method tries popular words or phrases for passwords to guess the password as quickly as possible

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

DoS / DDoS

A

A Denial of Service Attack (DoS attack) occurs when an attacker repeatedly sends requests to a server to flood the server with traffic, causing it to overload the system

The server will slow down to the point of becoming unusable

DDoS:
This works in a s similar way to a DoS attack, with the main difference being that the traffic comes from multiple distributed devices in a coordinated attack on a single server/network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Purpose of a DoS attack

A

A DoS attack will prevent customers from accessing or using a service

This will result in companies losing money and not being able to carry out their daily duties

A DoS attack can cause damage to a company’s reputation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

SQL injection

A

SQL injection is entering an SQL command into a web text field to manipulate the SQL query

The goal is to insert, modify or delete data from the database

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Penetration testing

A

Penetration testing is a method of preventing vulnerabilities whereby a company employ people to try and hack their network and databases

Protects against SQL injection + brute force attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Anti-Malware software

A

Anti-malware software is a term used to describe a combination of different software to prevent computers from being susceptible to viruses and other malicious software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

How does anti-malware software work

A

Anti-malware scans through email attachments, websites and downloaded files to search for issues

Anti-malware software has a list of known malware signatures to block immediately if they try to access your device in any way

Anti-malware will also perform checks for updates to ensure the database of known issues is up to date

Protects against any malware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

User access levels

A

Administrators: Unrestricted - Can access all areas of the network

Teaching Staff: Partially restricted - Can access all student data but cannot access other staff members’ data

Students: Restricted - Can only access their own data and files

17
Q

What do firewalls do

A
  • Separate a trusted network from an untrusted network (normally the Internet)
  • Data is sent around a network in small packets of information
  • These packets are checked to see where they are coming from and going to (incoming and outgoing packets)
    • Packets that don’t match filtering rules are dropped
    • This is known as a packet filter
18
Q

How do firewalls help and disadvantages

A
  • Prevents unauthorised access (hacking)
  • Can block certain malicious computers by filtering packets from a certain IP (Internet Protocol) address
  • Can prevent access to certain ports on the network.This is known as port blocking
  • Malicious or inappropriate websites can be blocked
  • Dedicated hardware firewalls are expensive
  • Software firewalls may slow down a computer