1.4 Network security Flashcards
What are examples of malware?
-Scareware
-Ransomware
-Spyware
-Rootkits
-Opening backdoors
-Viruses
-Worms
-Trojans
What is malware?
Malicious software that is installed without the person knowing and can harm devices.
What is scareware?
Tells the user their computer is infected with loads of viruses to scare them into following malicious links / paying for problems to be fixed.
What is ransomware?
Encrypts all the files on a computer and the user recieves a message demanding a large sum of money in exchange for a decryption key.
What is spyware?
Secretly monitors user actions like key presses and sends information to hacker.
What are rootkits?
They alter permissions to give malware and hackers administrator-level access to devices.
What are opening backdoors?
Holes in someone’s security which can be used for future attacks.
What are viruses?
They attach to certain files by copying themselves and are spread by users by copying infected files and activating them by opening infected files.
What are worms?
Similar to viruses but self-replicate without any user help therefore they spread very quickly and exploit weaknesses in network security.
What are trojans?
Malware disguised as legitimate software and users install them not realising they have a hidden purpose. Doesn’t replicate like worms / viruses.
What is a social engineering?
A way of gaining sensitive information / illegal access to networks by influencing people.
What is an example of social engineering?
- Someone rings up an employee of a company.
- They pretend to be a network administrator / somebody within same organisation.
- They gain the employee’s trust.
- They persuade them to disclose confidential information like personal log in details or sensitive company data.
What is phishing?
- Criminals send emails / texts to people claiming to be from a well-known business.
- The emails / texts contain links to spoof versions of the company’s website and then they request the user to update their personal information.
- When the user inputs this data into the website, they hand it all to criminals who can access the user’s genuine account.
Why are phishing emails sent to 1000s of people?
In the hope that someone will read the email and believe its content is legitimate.
What is a brute force attack?
-A type of active attack used to gain information by cracking passwords through trial and error.
-Use automated software to produce hundreds of likely password combinations.
What is an insider attack?
Someone within an organisation exploits their network to steal information.
How can you reduce risk of brute force attack?
-Lock accounts after a certain number of failed password attempts.
-Use strong passwords.
What is a denial of service (DOS) attack?
Hacker tries to stop users from accessing a part of a network or website by flooding the network with useless traffic so the network is extremely slow or completely inaccessible.