1.4 New Flashcards

1
Q

Malware

A

term for any software that has been created with malicious intent to cause harm to a computer system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

examples of issues caused by malware

A

-files being deleted, corrupted or encrypted
-internet connection becoming slow or unusable
-computer crashing or shutting down

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

what are the types of malware

A

-virus
-worms
-trojan
-spyware
-ransomware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

virus

A

a program which can replicate itself on a user’s computer. It contains code that will cause unwanted and unexpected events to occur

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

examples of what a virus can do

A

-corrupt files
-delete data
-prevent applications from running correctly

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

worms

A

similar to viruses except they will spread to other drives and computers on the network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

how can worms infect other computers

A

-infected websites
-instant message services
-email
-network connection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

trojan

A

disguise themselves as legitimate software but contain malicious code in the background

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

spyware

A

software which will allow a person to spy on the user’s activities on their devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

examples of what spyware can do

A

-record your screen
-log your keystrokes to gain access to passwords and more

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

how does one download spyware

A

embedded into other software like games or programs that have been downloaded from illegitimate sources

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

ransomware

A

-malware that locks your computer or device and encrypts your documents and other important files
-a demand in made for money to receive the password that will allow the user to the files
-no guarantee paying ransom will result in user getting data back

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

social engineering

A

exploiting weaknesses in a computer system by targeting the people that use or have access to them

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

examples of social engineering

A

-fraudulent phone calls
-phishing
-pretexting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

phishing

A

-sending fraudulent emails to a large number of email addresses claiming to be from a reputable company to try gain access to details, often by coaxing the user to click on a login button

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

examples of human errors in computer systems

A

-not locking doors to computer/server rooms
-not logging their device when they are not using it
-sharing passwords
-not encrypting data
-not keeping operating systems or anti-malware software up to date

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

brute force attack

A

attacker repeatedly tries multiple combinations of a user’s password to try and gain unauthorised access to their accounts or devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

dictionary attack

A

trying popular words or phrases for passwords to guess the password quickly

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

DoS attack

A

-occurs when an attacker repeatedly sends requests to a server to flood the server with traffic, causing it to overload the system
-server slows down until it becomes unusable

20
Q

larger scale of DoS attack

A

-Distributed Denial of Service
-multiple devices in a coordinated attack

21
Q

botnet

A

numerous internet-connected devices that have been infected with malware and can be controlled remotely by an attacker

22
Q

purpose of a DoS attack

A

-prevents customers from accessing or using a service
-results in companies losing money
-damage to a company’s reputation

23
Q

data interception and theft

A

-when thieves compromise usernames and passwords and other sensitive data
-using packet sniffer, which can collect data that is being transferred on a network
-gain unauthorised access to websites, companies and more

24
Q

SQL

A

language to create, access and manipulate a database

25
SQL injection
-entering an SQL command into a web text field to manipulate the query -to insert, modify, delete or gain unauthorised access to the database
26
penetration testing
-method or preventing vulnerabilities where a company employs people to try and hack their network and databases -allows hackers to point out the parts of the system that are vulnerable -company uses this information to fix the issues that are found
27
what does penetration testing protect against
SQL injection
28
anti-malware
term to describe a combination of different software to prevent computers from being susceptible to viruses and other malicious software
29
types of anti-malware
-anti-virus -anti-spam -anti-spyware
30
how does anti-malware work
-scans through email attachment, websites and downloaded files to search for issues -has a known list of malware signatures to block immediately if they try to access -perform checks for updates to ensure database of known issues are up to date
31
what does anti-malware protect against
any form of malicious software
32
firewall
barrier between a network and the internet
33
what does a firewall do
prevents unwanted traffic from entering a network by filtering requests to ensure they are legitimate
34
hardware firewall
-protect the whole network and prevent unauthorised traffic
34
software firewall
protect the individual devices on the network. monitoring the data going to and from each computer
35
what does a firewall protect against
-hackers -malware -unauthorised access to a network -DoS/DDoS attacks
36
user access levels
-ensure users of a network have designated roles on a network
37
password
digital lock to prevent unauthorised access to an account -stores as an encrypted text entry in a database, ensuring even with unauthorised access to a database, a hacker would not be able to gain access to individual passwords of users
38
what forms of attacks does user access levels and passwords prevent
-data interception and theft -physical security issues -SQL injections
39
encyrption
-method of converting plain text into ciphered text to be stored
40
what forms of attacks does encryption prevent
all forms of attack on a network -does not prevent attack from occurring but stops attacker from gaining access to the information
41
physical security
method of physically preventing access to any pat of a network
42
examples of physical security measures
-locked doors: prevents access to server rooms and switches -biometrics -surveillance cameras
43
what form of attacks to physical security prevent
-data interception and theft -social engineering
44
chart
https://www.savemyexams.com/gcse/computer-science/ocr/22/revision-notes/4-network-security/identifying-and-preventing-threats-to-computer-systems-and-networks/methods-of-preventing-a-network-attack/
46
Why should someone use encryption
-data cannot be understood -personal information can be stolen -follow legilsation