3 - Network and Computer Attacks Flashcards

1
Q

Virus

A

Attaches itself to a file or another program. Doesn’t stand on its own and needs host to replicate.
eg. Gumblar, Zlob

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Worm

A

A program that replicates and propagates itself without having to attach itself to a host.
eg. Storm, Slammer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Trojan Programs

A

Is an insidious attack against networks and computers. They disguise themselves as useful programs and can install a backdoor or rootkit on a computer. They can use ports 80 (HTTP) and 53 (DNS).
eg. Back Orifice

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Spyware

A
  • Send information from infected computer to attacker eg.
    • Confidential financial data
    • Passwords
    • PINs
    • Any other stored data
  • Can register each keystroke entered
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

How to protect against Malware attacks

A
  • Educate users
  • Anti virus programs
  • Avoid fear tactics
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Denial of Serivce Attacks

A

This attack prevents legitimate users from accessing network resources.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Distributed Denial of Service Attacks

A

An attack Launched against a host from multiple servers or workstations. The network could be flooded with billionsof packets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Buffer Overflow Attacks

A

An exploit written by a programmer that finds a vulnerability in poorly written code

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Ping of Death Attacks

A

A type of DoS attack.
-Attacker creates an ICMP packet that’s larger than the maximum allowed 65,535 bytes.

  • The large packet is fragmented into smaller packets and then reassembled at its destination.
  • The user’s systems at the destination is unable to handle the reassembled packet, it causes the system to crash or freeze.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Session hijacking

A

This attack enables an attacker to join a TCP session and make both parties think he or she is the other party.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Address physical Security

A
  • Protecting a network - Requires physical security not just softwares
  • Inside attacks are more likely than outside attacks.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Keyloggers

A

Hardware devices or software that can be used to capture keystrokes on a computer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Locks?

A
  • Lock up servers
  • Rotary locks are harder to pick
  • Keep a record of who enters and leaves the room
How well did you know this?
1
Not at all
2
3
4
5
Perfectly