4.1 Network Threats Flashcards

You may prefer our related Brainscape-certified flashcards:
1
Q

What is malware?

A

Malicous executable programs that run on a computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Give examples of Malware

A

Viruses, worms, trojans, ransomware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are viruses?

A

Code that infect computers
• They replicate their code in other programs
• They infect other computers
• They harm the computer by deleting, corrupting or modifying files

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are worms?

A

A worm replicates itself in order to soread to other computers
• They might cause no damage to the attacked computers
• They slow down networks and computers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are Trojans?

A

Negative program code which causes damage, , takes control, or provides access to computers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is ransomware?

A

Software that:
• Holds a computer hostage by locking or encrypting access to it
• If the data is encrypted, a cyber security specialist won’t be able to recover the data unless a backup is available
• Once a ransom is paid to the attacker, the computer might be restored

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are ways hackers can exploit technical vulnerabilities?

A
  • Unpatched software - if software updates and security updates are not installed then the software will be vulnerable
  • Out of date anti malware - if software such as antivirus , isn’t regularly updated then it won’t be able to detect the latest viruses
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is social engineering?

A

The ability to obtain confidential information by asking people for it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is Shoulder Surfing?

A

The ability to get information or passwords by observing as someone types them in.
• CCTV
• Looking over someone’s shoulder

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is phishing?

A
Phishing is a type of social engineering technique where, emails, texts or phone calls are sent to users commonly pretending to be banks or websites. They try to steal information such as
• Usernames
• Passwords
• Credit card details
• Other personal information
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Features of phishing attacks

A
Greetings aren't personlised
Sender's address is often a variation of a genuine address
Forged link and is not the exact link
Request your personal details
Rushed
Poor spelling and grammar
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Denial of Service

A

A hadker will use or infect a computer so that:
• it sends many requests to the server (flood)
• the server can’t respond fast enough so it slows down or goes offline

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Distributed Denial of Service

A

Many computers are making requests to the server, not just one

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Man in the middle attack

A
  • A man in the middle attack (MITM) allows the attacker to intercept communications between the user and server. The attacker can then:
  • eavesdrop to find passwords and personal information
  • add different information to a web page or other communication such as email.
  • Connecting to uncrypted Wi-Fi makes it easy to perform a MITM attack
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Why shouldn’t you use a found free USB stick?

A

• It may contain malware that can steal data from your device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Data theft

A

Stealing private data

17
Q

Threats from digital decices

A
  • Data loss
  • ‘Back doors’ to devices
  • Frauds
18
Q

Reeucing threats on mobile devices

A
  • Use a strong password
  • Make sure data is encrypted
  • Do not follow special links
  • Delete information before discarding
19
Q

Brute Force Attacks

A
  • A hacker will try every combination of password untill the correct password is found
  • A computer program is designed to do this 1 million times a second
20
Q

SQL

A
  • Structured Query Language

* Database query language

21
Q

SQL injection

A

• Using web forms to add SQL instructions to a query that cause data loss or the revealing of personal information

22
Q

How to execute SQL Injection

A
  • SQL Commands are inserted instead of ‘real’ data

* These can return or destroy valuable data