2.1 Types of Cyber Security Threats Flashcards

1
Q

What is vishing?

A

the fraudulent practice of making phone calls or leaving voice messages purporting to be from reputable companies in order to induce individuals to reveal personal information, such as bank details and credit card numbers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is phishing?

A

Phishing is a form of social engineering and a scam where attackers deceive people into revealing sensitive information or installing malware such as viruses, worms, adware, or ransomware.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is a DoS attack?

A

A denial-of-service (DoS) attack is a type of cyber attack in which a malicious actor aims to render a computer or other device unavailable to its intended users by interrupting the device’s normal functioning. DoS attacks typically function by overwhelming or flooding a targeted machine with requests until normal traffic is unable to be processed, resulting in denial-of-service to addition users.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are Trojans?

A

Trojan horse is a type of malware created by hackers to look more like a legitimate software. It attaches itself to genuine files that are downloaded from the internet. Trojan horses find their way to the victims’ system through some social engineering tricks to load and run the trojans on the victim’s system. Once the Trojans find its place, it empowers the hackers to extract users’ information without their knowledge and creates a backdoor for them to gain granular access to the system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is Botnet?

A

A network system infected with malicious software allowing control without the owner’s knowledge or content

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is Spyware?

A

Spyware is malicious software that gathers info from a device without the user’s knowledge, it tracks various forms of data such as passwords or personal details.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is Social Engineering?

A

When someone is manipulated into providing confidential information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is Pharming?

A

Online fraud that involves the use of malicious code to direct victims to spoofed websites in an attempt to steal their credentials and data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is Keylogging?

A

Records keystrokes to capture sensitive data such as passwords.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is hacking?

A

Act of exploiting weakness in a computer or system to steal data or gain unauthorised access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is man in the middle?

A

a man-in-the-middle attack, or on-path attack, is a cyberattack where the attacker secretly relays and possibly alters the communications between two parties who believe that they are directly communicating with each other, as the attacker has inserted themselves between the two user parties.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly