1.6 System Security Flashcards
Define malware
MALicious softWARE written to infect computers and commit crimes such as fraud and identity theft.
Define virus
Malware designed to cause harm to a network or computer.
Most have a human element to them.
Attaches itself to programs or files on a computer or server.
Almost all are attached to an executable file, so the virus may exist on a system; won’t be active or able to spread until a user runs or opens the malicious host file or program.
Often spread through files, programs, emails, messages or games that you download.
Define worms
Replicates itself to spread to other computers often using a computer network and fills up the RAM.
To achieve this, the worm exploits vulnerabilities across the computer network.
Unlike a virus, it doesn’t need to attach to a program.
Define trojan horse
Users are typically tricked into loading and executing it on their systems.
After it’s activated, it can achieve any number of attacks on the host.
Create back doors to give malicious users access to the system.
Trojans must spread through user interaction such as opening an e-mail attachment or downloading and running a file from the internet.
Define network policies
How a system can be secured through specific rules or requirements
Define firewalls
Software that performs a “barrier” between a potential attacker and the computer system.
Can be held on a server, or a standalone computer.
Many have this feature as part of an anti-virus package.
Not 100% effective – an attacker could exploit a vulnerability.
Monitors applications and network usages.
Can block access from certain computer users and disable processes which may be perceived as a threat.
Define penetration testing
Tests performed under a controlled environment by a qualified person.
Checks for current vulnerabilities and explores potential ones in order to expose weaknesses in the system so they can’t be maliciously exploited.
May use tools to help them in their duties.
Define penetration testing
Tests performed under a controlled environment by a qualified person.
Checks for current vulnerabilities and explores potential ones in order to expose weaknesses in the system so they can’t be maliciously exploited.
May use tools to help them in their duties.
How can you prevent malware?
1) Strong security software (firewall, spam filter, anti-virus, anti-spyware, anti-spam).
2) Enable OS updates.
3) Staff training: caution opening attachments.
4) Back up files regularly.
Define social engineering
Relies on human interaction (social skills).
Commonly involves tricking users into breaking normal security procedures.
Method doesn’t revolve around technical cracking techniques such as: worms or viruses.
Define phishing
Form of social engineering.
Designed to acquire sensitive information such as: usernames, passwords, card details etc.
Most common phishing attacks are sent through email.
What are the effects of phishing?
1) Accessing a victim’s account and withdraw money or purchase merchandise or services.
2) Open new bank or credit-card accounts in a victim’s names, and use the new account to cash illegitimate checks or purchase merchandise.
3) Gaining access high-value corporate data.
4) Financial services can blacklist institutions, resulting in reputational damage.
How can you prevent phishing?
1) Strong security software (firewall, spam filter, anti-virus, anti-spam).
2) Staff training: awareness of spotting fake websites & amp; emails.
3) Staff training: never disclose personal or financial information.
4) Staff training: disable pop-ups.
Define brute force attack
1) Strong security software (firewall, spam filter, anti-virus, anti-spam).
2) Staff training: awareness of spotting fake websites & amp; emails.
3) Staff training: never disclose personal or financial information.
4) Staff training: disable pop-ups.
4
14
Define brute force attack
Trial and error method used by programs to decode encrypted data such as: passwords or Data Encryption Standard (DES) keys, through exhaustive effort rather than employing intellectual strategies.
What are the effects of brute force attack?
1) Theft of data.
2) Access to corporate systems