1b - How External Threats Function Flashcards

1
Q

List the types of malware

A

Spyware, adware, ransomware, viruses, worms, rootkits, trojans

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What does spyware do?

A

gathers information and data from the device it has infected and sends it away, done with keylogger.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What does adware do?

A

displays advertisements used to generate revenue, often with pop-ups.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What does ransomware do?

A

Prevents a user accessing their system, often by encrypting files. Demands a sum of money to unencrypt data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What do viruses do?

A

Viruses modify existing programs with malicious code, and constantly replicate throughout a computer, they usually corrupt data and utilise system performance.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What do worms do?

A

Worms are similar to viruses, however, they can replicate through networks instead of shared files.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What do rootkits do?

A

Rootkits are used to get unauthorised remote administrator access to a computer or network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What do trojans do?

A

Trojans are malicious code disguised as a regular program. Often accidentally downloaded by the user.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is meant by heuristic analysis.

A

Heuristic analysis is often done by an antivirus and scans a program for irregular commands or instructions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is signature based analysis?

A

Signature based analysis scans a program against a repository of static signatures. These signatures are often found in packet headers or data contents.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Generally define hacking.

A

Hacking is a term that describes the exploitation of vulnerabilities in a computer system in order to gain unauthorised access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Define attack vector.

A

An attack vector is the path or method that an attacker takes to gain unauthorised access to a system or data. Often used to deliver payloads.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Define white hat hacking.

A

Authorised hacking in order to uncover weaknesses in a system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Why do governments and companies hack?

A

evaluate their own weaknesses, profit, gather information (corporate espionage)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Define the plan-do-check-act loop.

A

PDCA provides a simple and effective way of testing for improvement on a small scale before updating procedures and working practices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Define sabotage.

A

Generic term that applies to a deliberate attempt to disrupt systems.

17
Q

List some examples of sabotage.

A

DOS attack, distributing malware, physical damage to systems, embedding malicious code into systems.

18
Q

Define social engineering.

A

Exploiting the human elements in a system in order to gain access to a system.

19
Q

What is an APT?

A

Advanced persistent threat. Persistent, secretive, and sophisticated hacking techniques. High effort so usually targeted at high value targets (companies and governments).