5.3 Cyber Security Flashcards
What are the cyber security threats?
- Brute force attacks
- Data interception
- Distributed denial of service (DDoS) attacks
- Hacking
- Malware (viruses, worms, trojan horse, spyware, adware and ransomware)
- Phishing
- Pharming
- Social engineering.
How does brute force attacks?
A hacker tries to crack your password by systematically trying all the different combinations of letters, numbers and other symbols.
What are the solutions to brute force?
- Use long password with a variation of characters e.g. upper and lower case letters, numbers and symbols.
- Limit the number of attempts allowed for inputting the password.
How does data interception work?
Data interception is a form of stealing data by tapping into a wired or wireless communication link. The intent is to compromise privacy or to obtain confidential information.
Interception can be carried out using a packet sniffer, which examines data packets being sent over a network.
What is packet sniffing?
It is a method used by a cybercriminal to examine data packets being sent over a network and to find the contents of a data packet, which are sent back to the cybercriminal.
What is war driving?
The act of locating and using wireless connections illegally.
Wi-Fi (wireless) data interception can be carried out using a laptop or smartphone, antenna and a GPS device outside a building or somebody’s house. The intercepted Wi-Fi signal can then reveal personal data to the hacker, often without the user being aware this is happening.
What are the solutions to data interception?
- Use of Wired Equivalent Privacy (WEP) encryption
- Use of firewalls to prevent outside users from gaining access
- Protect the use of wireless device with complex passwords before the internet can be accessed
What is Distributed Denial of Service (DDoS) attacks?
A denial of service (DoS) attack is an attempt at preventing users from
accessing part of a network, notably an internet server.
The attacker may be able to prevent a user from:
• accessing their emails
• accessing websites/web pages
• accessing online services (such as banking).
What are the solutions to Distributed Denial of Service (DDoS) attacks?
- Using an up-to-date malware checker
- Setting up a firewall to restrict traffic to and from the web server or user’s computer
- Applying email filters to filter out unwanted traffic (for example, spam)
- Use a proxy server to redirect unauthorised traffic.
What is Hacking?
Hacking is generally the act of gaining illegal access to a computer system without the user’s permission.
This can lead to identity theft or the gaining of personal information; data can be deleted, passed on, changed or corrupted.
What is Ethical Hacking?
Authorise hackers paid by companies to check out their security measures and test how robust their computer systems are to hacking attacks.
What are the solutions to Hacking?
- Use complex password with a variation of characters e.g. upper and lower case letters, numbers and symbols.
- Use of anti-hacking software
- Use firewall to monitors for malicious traffics
- Use encryption for sensitive data
What is Malware?
Malware, short for malicious software is any intrusive software developed by hackers to steal data and damage or destroy computers and computer systems.
Examples of malware include viruses, worms, Trojan horse, spyware, adware, and ransomware
Definition of viruses
Viruses are programs that can replicate/copy themselves with the intention of deleting or corrupting files, or causing the computer to malfunction.
They need an active host program on the target computer or an operating system that has already been infected before they can run.
Definition of worms
Worms are a type of stand-alone malware that can self-replicate. Their intention is to spread to other computers and corrupt whole networks.
Unlike viruses, they don’t need an active host program to be opened in order to do damage.