5.3 A - Data Security Flashcards

You may prefer our related Brainscape-certified flashcards:
1
Q

What are all the types of diff cyber security threats (8)

A

» brute force attacks
» data interception
» distributed denial of service (DDoS) attacks
» hacking
» malware (viruses, worms, Trojan horse, spyware, adware and ransomware)
» phishing
» pharming
» social engineering.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is a brute force attack

A

a ‘trial and error’ method used by cybercriminals to crack passwords by finding all possible combinations of letters, numbers and symbols until the password is found

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is a word file

A

a text file containing a collection of words used

in a brute force attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is data interception

what is used

A

an attempt to eavesdrop on a wired or wireless network transmission often using packet sniffing or access point mapping / wardriving

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What does a packet sniffer do

A

Examines packets being sent over a network to find the contents of a data packet, which are sent back to the cybercriminal

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is wardriving

other name

A

Using a laptop, antenna, GPS device and software to intercept Wi-Fi signals and illegally obtain data

aka access point mapping

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is a WEP

A

wired equivalency privacy - an algorithm for wireless networks to protect them against data interception by encrypting the data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is a DOS

what can it prevent the user from

A

Denial of Service - An attack where the normal operation of a website is disrupted by flooding it with requests.

prevent users from:
accessing their emails
accessing websites/web pages
accessing online services (eg banking)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is a DDOS

A

Distributed Denial of Service - a denial of service (DoS) attack in which the fake requests come from many different computers, which makes it harder to stop

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

How to gaurd against a DOS and DDOS

A

» using an up-to-date malware checker
» setting up a firewall to restrict traffic to and from the web server or user’s computer
use a proxy server
» applying email filters to filter out unwanted traffic (for example, spam).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

How to tell if you have been DDOS’d

A

» slow network performance (opening files or accessing certain websites)
» inability to access certain websites
» large amounts of spam email reaching the user’s email account.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is Hacking

A

the act of gaining illegal access to a computer system without the owner’s permission

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

How to prevent hacking

A
Use of firewalls 
frequently changed strong passwords
usernames
Intrusion detection software
Anti-hacking software

Encrypting data - doesn’t prevent hacking but makes data meaningless. Hackers can still delete it, corrupt it, or pass on the data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

what is malware

6 types of malware

A

malicious software that aims to delete corrupt or manipulate data illegally.

Viruses
Ransomware
Adware
Spyware
Trojan horse
worms
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are viruses

A

Program or program code that replicates itself with the intention of deleting or corrupting files or by causing the computer system to malfunction

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is an active host

A

functioning software that a virus can affect by attaching itself to the code or by altering the code to allow the virus to carry out its attack

17
Q

What are worms

A

Standalone malware that aim to corrupt whole networks not individual computers and don’t need an active host program or any action from the end-user.

18
Q

How does worms spread through the network

A

They remain inside applications which allows them to move throughout networks.

They rely on security failures within networks to permit them to spread unhindered.

19
Q

What is a Trojan horse

A

A program which is often disguised as legitimate software but with malicious instructions embedded within it.

20
Q

How does a trojan horse work

A

Replaces all or part of the legitimate software with the intent of carrying out some harm to the user’s computer system.

21
Q

Why are firewalls and other security measures useless against trojan horses usually

A

They rely on tricking the end-users and hence the user can overrule the security measures and initiate the running of the malware.

22
Q

What is spyware

how is spyware countered

A

Gathers information by monitoring a user’s activities on a computer and sends the data back to the cybercriminal who sent out the spyware

Antispyware

23
Q

What is adware

A

A type of malware that attempts to flood the end-user with unwanted advertising

24
Q

What can adware do

A

» highlight weaknesses in a user’s security defenses
» be hard to remove – it defeats most anti-malware software since it can be difficult to determine whether or not it is harmful
» hijack a browser and create its own default search requests.

25
Q

What is ransomware

A

Malware that encrypts data on a user’s computer and ‘holds the data hostage’ until a ransom is paid

26
Q

What is phishing

A

sending out legitimate-looking emails designed to trick the recipients into giving their personal details the sender of the email

27
Q

What is spear-phishing

A

Target specific individuals or companies to gain access to sensitive financial information or industrial espionage

28
Q

What is pharming and what makes it diff from phishing

A

redirecting a user to a fake website in order to illegally obtain personal data about the user without their knowledge

unlike phishing, pharming is initiated without needing any action by the user

29
Q

What is DNS Cache poisoning

what is it used in?

A

altering IP addresses on a domain name server (DNS) with the intention of redirecting a user’s browser to a fake website

used in pharming

30
Q

How to counter pharming

A

Anti-virus software

It is very important to check the spelling of websites to ensure the web address used is correct.

Use of https or the GREEN PADLOCK SYMBOL in the address bar is an additional form of defence

31
Q

What is social engineering

A

manipulating people into breaking normal security procedures (such as giving away their password) in order to gain illegal access to computer systems or to place malware on their computer

32
Q

Emotions that are exploited by social engineers

A

Fear - user thinks computer is in immediate danger and isn’t given time to make a logical decision

Curiosity

Empathy and trust

33
Q

5 types of social engineering. Explain all and emotion they rely on

A

Instant messaging - Malicious links are embedded into instant messages (relies on curiosity)

Scareware - pop-up saying that the user has been infected by a viurs. They are told that they are needed to download a fake anti-virus (fear)

Phishing - tricked by the geniuiness of emails. (trust of well known companies)

baiting - malware infected memory sticks in public. User picks it up and plugs it in their computer (curiosity)

phone calls - IT professional calls user and tells them that their device has been compromised. Adviced to download a special software that would allow cyber criminal to take over user’s device and give access to personal information (fear)

34
Q

Explain stages of social engineering

A

stage 1 - victims are identified and information is gathered about them. attack method decided

stage 2 - victim is targetted.

stage 3 - attack is executed.

stage 4 - remove all traces of malware to cover tracks.D

35
Q

Define Ethical Hacking

A

occurs when companies authorise paid hackers to test how robust their computer systems are to hacking attacks.

36
Q

How to counter phishing

A

users need to be aware of new phishing scams;

it is important not to click on any emails links unless totally certain that it is safe to do so

it is important to run anti-phishing toolbars on browsers - alert the user to malicious websites
contained in an email

always look out for https or the green padlock symbol in the address bar

regular checks of online accounts are also advisable as well as maintaining passwords on a regular basis

» ensure an up-to-date browser is running on the computer device and run a good firewall in the
background at all times

be very wary of pop-ups and use the browser to block them;

37
Q

What does the green padlock help counter

substitute for green padlock

A

substitute: httpS
the letter s - stands for secure

helps counter phishing and pharming both.