1.4 Network Security Flashcards
How are viruses used?
- Self-replicating
- Dormant until host program is run
What is the purpose/effect of viruses?
- Send spam
- Steal data
- Infect other computers
- Corrupt/Delete files
How are trojans used?
- Disguised as another legitimate program
- Can only function if host program is run
What is the purpose/effect of trojans?
- Data theft
- Redirecting search requests
- Installing other malware
- Opening a back door for external control over device
- Used to create botnets for DDoS
How are worms used?
Replicate and distribute independently
What is the purpose/effect of worms?
- Designed to spread quickly
- May cause no damage
- DoS
How is spyware used?
- Installed without the user’s knowledge
- Can monitor internet usage
What is the purpose/effect of spyware?
- Intends to capture data and relay information to the hacker
- Keyloggers are used to track key inputs and recognise passwords and sensitive data such as bank details
How is ransomware used?
Locks computers or encrypts files
What is the purpose/effect of ransomware?
The attacker can then demand a fee for the release of files/computer though there is no guarantee of their return
How is phishing used?
- Victim receives a message disguised as a reputable source that includes a link
- Often sent in bulk
- Uses scare tactics such as “your account has been suspended”
- Spear phishing is more personal and effective
What is the purpose/effect of phishing?
- Tricks victims into revealing personal details
- Installs malware on the victim’s device
How is pharming used?
- Registering a similar web address to a legitimate one e.g. change of domain
- DNS poisoning is where the DNS server of a legitimate site is hacked so that when the real web address is entered, the victims are transferred to a fake one
What is the purpose/effect of pharming?
Tricks victims into revealing personal details
How is blagging used?
The attacker attempts to engage in an online conversation with the victim
What is the purpose/effect of blagging?
Tricks victims into revealing their personal details