4.1 Network Threats Flashcards
What is malware?
Malicous executable programs that run on a computer
Give examples of Malware
Viruses, worms, trojans, ransomware
What are viruses?
Code that infect computers
• They replicate their code in other programs
• They infect other computers
• They harm the computer by deleting, corrupting or modifying files
What are worms?
A worm replicates itself in order to soread to other computers
• They might cause no damage to the attacked computers
• They slow down networks and computers
What are Trojans?
Negative program code which causes damage, , takes control, or provides access to computers
What is ransomware?
Software that:
• Holds a computer hostage by locking or encrypting access to it
• If the data is encrypted, a cyber security specialist won’t be able to recover the data unless a backup is available
• Once a ransom is paid to the attacker, the computer might be restored
What are ways hackers can exploit technical vulnerabilities?
- Unpatched software - if software updates and security updates are not installed then the software will be vulnerable
- Out of date anti malware - if software such as antivirus , isn’t regularly updated then it won’t be able to detect the latest viruses
What is social engineering?
The ability to obtain confidential information by asking people for it
What is Shoulder Surfing?
The ability to get information or passwords by observing as someone types them in.
• CCTV
• Looking over someone’s shoulder
What is phishing?
Phishing is a type of social engineering technique where, emails, texts or phone calls are sent to users commonly pretending to be banks or websites. They try to steal information such as • Usernames • Passwords • Credit card details • Other personal information
Features of phishing attacks
Greetings aren't personlised Sender's address is often a variation of a genuine address Forged link and is not the exact link Request your personal details Rushed Poor spelling and grammar
Denial of Service
A hadker will use or infect a computer so that:
• it sends many requests to the server (flood)
• the server can’t respond fast enough so it slows down or goes offline
Distributed Denial of Service
Many computers are making requests to the server, not just one
Man in the middle attack
- A man in the middle attack (MITM) allows the attacker to intercept communications between the user and server. The attacker can then:
- eavesdrop to find passwords and personal information
- add different information to a web page or other communication such as email.
- Connecting to uncrypted Wi-Fi makes it easy to perform a MITM attack
Why shouldn’t you use a found free USB stick?
• It may contain malware that can steal data from your device