1.4.1 Common System Threats Flashcards

You may prefer our related Brainscape-certified flashcards:
1
Q

Why are networks attacked?

A

Personal, business and financial information is extremely valuable and traded between criminals around the world.
Stolen usernames and passwords allow criminals to access bank account and private info.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is malware short for?

A

Malicious software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is Malware?

A

A piece of software designed to break security and damage a system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are the different types of malware?

A

Virus
Worm
Trojan
Spyware
Adware
Ransomware
Pharming

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is a virus?

A

A program hidden within another program or file, designed to cause damage to file systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is a worm?

A

A malicious program that acts independently and can replicate itself to spread between multiple connected systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Trojan

A

Installed by a user thinking its a legitimate piece of software when it will actually cause damage or provide access for criminals

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Spyware

A

Secretly passes info onto a criminal without the user’s knowledge, often packed with free software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Adware

A

Displays targeted advertising and redirects search requests without permission

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Ransomware

A

Limits or denies a user to access their system until a ransom is paid to unlock it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Pharming

A

The redirecting of a user’s website – by modifying their domain name server (DNS) entries – to a fraudulent site without their permission

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are computer users seen as withing any sytem?

A

Weak point

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

How does phishing pretend to be trusted organisations or contacts?

A

uses email, Text messages and phone calls to impersonate. Details gained can be used to access and steal from online accounts.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

How have organisations tried to prevent phishing?

A

Agreed never to add click links within messages or contact users directly to confirm their personal info.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is shouldering?

A

Technique of watching a user at an ATM and recording their PIN details

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is blagging?

A

carried out face to face and uses believable scenarios to trick people into giving up personal info

17
Q

What is a brute force attack?

A

Repeatdly tries different usernames and passwords to access a system

18
Q

What does DoS stand for?

A

denial of service

19
Q

What is a denial of service attack?

A

tries to flood a website or network with data traffic to bring it to a halt. Such attacks are often used to demand a ransom or a change in policy.

20
Q

What is data interception and theft?

A

method of intercepting and decoding a message containing sensitive info before it reaches it destination.

21
Q

What is a SQL injection?

A

uses the same Structured Query Language used to manage large databases to attack them. Commands written in this language are used instead of usernames and passwords to access and steal private info.