5.3 Cyber Security Flashcards

1
Q

What are the cyber security threats?

A
  1. Brute force attacks
  2. Data interception
  3. Distributed denial of service (DDoS) attacks
  4. Hacking
  5. Malware (viruses, worms, trojan horse, spyware, adware and ransomware)
  6. Phishing
  7. Pharming
  8. Social engineering.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

How does brute force attacks?

A

A hacker tries to crack your password by systematically trying all the different combinations of letters, numbers and other symbols.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are the solutions to brute force?

A
  1. Use long password with a variation of characters e.g. upper and lower case letters, numbers and symbols.
  2. Limit the number of attempts allowed for inputting the password.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

How does data interception work?

A

Data interception is a form of stealing data by tapping into a wired or wireless communication link. The intent is to compromise privacy or to obtain confidential information.

Interception can be carried out using a packet sniffer, which examines data packets being sent over a network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is packet sniffing?

A

It is a method used by a cybercriminal to examine data packets being sent over a network and to find the contents of a data packet, which are sent back to the cybercriminal.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is war driving?

A

The act of locating and using wireless connections illegally.
Wi-Fi (wireless) data interception can be carried out using a laptop or smartphone, antenna and a GPS device outside a building or somebody’s house. The intercepted Wi-Fi signal can then reveal personal data to the hacker, often without the user being aware this is happening.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are the solutions to data interception?

A
  1. Use of Wired Equivalent Privacy (WEP) encryption
  2. Use of firewalls to prevent outside users from gaining access
  3. Protect the use of wireless device with complex passwords before the internet can be accessed
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is Distributed Denial of Service (DDoS) attacks?

A

A denial of service (DoS) attack is an attempt at preventing users from
accessing part of a network, notably an internet server.

The attacker may be able to prevent a user from:
• accessing their emails
• accessing websites/web pages
• accessing online services (such as banking).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are the solutions to Distributed Denial of Service (DDoS) attacks?

A
  • Using an up-to-date malware checker
  • Setting up a firewall to restrict traffic to and from the web server or user’s computer
  • Applying email filters to filter out unwanted traffic (for example, spam)
  • Use a proxy server to redirect unauthorised traffic.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is Hacking?

A

Hacking is generally the act of gaining illegal access to a computer system without the user’s permission.

This can lead to identity theft or the gaining of personal information; data can be deleted, passed on, changed or corrupted.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is Ethical Hacking?

A

Authorise hackers paid by companies to check out their security measures and test how robust their computer systems are to hacking attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are the solutions to Hacking?

A
  1. Use complex password with a variation of characters e.g. upper and lower case letters, numbers and symbols.
  2. Use of anti-hacking software
  3. Use firewall to monitors for malicious traffics
  4. Use encryption for sensitive data
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is Malware?

A

Malware, short for malicious software is any intrusive software developed by hackers to steal data and damage or destroy computers and computer systems.
Examples of malware include viruses, worms, Trojan horse, spyware, adware, and ransomware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Definition of viruses

A

Viruses are programs that can replicate/copy themselves with the intention of deleting or corrupting files, or causing the computer to malfunction.
They need an active host program on the target computer or an operating system that has already been infected before they can run.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Definition of worms

A

Worms are a type of stand-alone malware that can self-replicate. Their intention is to spread to other computers and corrupt whole networks.
Unlike viruses, they don’t need an active host program to be opened in order to do damage.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Definition of Trojan horse

A

A Trojan horse is a program which is often disguised as legitimate software but with malicious instructions embedded within it.
Once installed on the user’s computer, the Trojan horse will give cyber criminals access to personal information on your computers, such as IP addresses, passwords and other personal data.

17
Q

Definition of Spyware

A

Spyware is software that gathers information by monitoring a user’s activities carried out on the user’s computer. The gathered information is sent back to the hackers who originally sent the spyware.

18
Q

Definition of Adware

A

Adware is the least dangerous of malware that attempt to flood user with unwanted advertising.
It could redirect a user’s browser to a website that contains promotional advertising in the form of pop-ups or redirect search requests.

19
Q

Definition of Ransomware

A

Ransomwares are programs that encrypt data on a user’s computer and hold the data hostage. The cybercriminal waits until the ransom money is paid, and the decryption key is then sent to the user.

20
Q

What are the solutions to Malware?

A
  1. Install anti-malware software (antivirus and antispyware software) and scan the computer regularly
  2. Don’t download or install software from unknown sources
  3. Be careful when opening emails or attachments from unknown senders
  4. Do regular back ups of important files
  5. Keep your operating system, browsers and software updated
  6. Use firewall protection
21
Q

What is Phishing?

A

Legitimate-looking emails with link or attachment when click will send the user to fake website with the intention to trick the user into responding with personal data (for example, bank account details or credit/debit card details).

22
Q

What is spear phishing?

A

The cybercriminal targets specific individuals or companies to gain access to sensitive financial information or industrial espionage.

23
Q

What are the solutions to Phishing?

A
  1. Security awareness training for the users to become aware of how to identify phishing scams
  2. The user should always be cautious not to click on any email’s links unless totally certain that it is safe to do so
  3. it is important to run anti-phishing toolbars on browsers since these will alert the user to malicious websites contained in an email
  4. Always look out for https or the green padlock symbol in the address bar
  5. Regular checks of online accounts are also advisable as well as maintaining passwords on a regular basis
  6. Keep your browser up to date and firewall running on the computer device
  7. Be very cautious of pop-ups and use the browser to block them
23
Q

What are the solutions to Phishing?

A
  1. Security awareness training for the users to become aware of how to identify phishing scams
  2. The user should always be cautious not to click on any email’s links unless totally certain that it is safe to do so
  3. it is important to run anti-phishing toolbars on browsers since these will alert the user to malicious websites contained in an email
  4. Always look out for https or the green padlock symbol in the address bar
  5. Regular checks of online accounts are also advisable as well as maintaining passwords on a regular basis
  6. Keep your browser up to date and firewall running on the computer device
  7. Be very cautious of pop-ups and use the browser to block them
24
Q

What is Pharming?

A

Pharming is malicious code installed on a user’s computer or on an infected website. The code redirects the user’s browser to a fake website without the user’s knowledge.
Often the website appears to come from a trusted source and can lead to fraud and identity theft.

25
Q

What is DNS cache poisoning?

A

DNS cache poisoning changes the real IP address values to those of the fake website and the user’s computer will connect to the fake website.

26
Q

What are the solutions to Pharming?

A
  1. Use anti-spyware software to identify and remove pharming code from the hard disk
  2. It is very important to check the spelling of websites to ensure the web address used is correct.
  3. Check for https or the green padlock symbol in the address bar.
  4. Use anti-malware software to ensure the sites you visit are trustworthy.
  5. User should always be alert and look out for clues that they are redirected to another website
27
Q

What is social engineering?

A

Social engineering is manipulating people into breaking normal security procedures (e.g. passwords) to gain illegal access to computer systems or to place malware on their computer.

28
Q

What are the 3 most common exploitation of human emotions in social engineering?

A
  1. Fear – the user is panicked into believing their computer is in immediate danger and isn’t given time to logically decide if the danger is genuine or not
  2. Curiosity – the user can be tricked into believing they have won a prize and giving their information willingly.
  3. Empathy and trust – a real belief that all genuine-sounding companies can be trusted, therefore emails or phone calls coming from such companies must be safe
29
Q

What are the solutions to social engineering?

A
  1. Don’t open emails and attachments from suspicious sources
  2. Be wary of tempting offers
  3. Security awareness training for users to be aware of the dangers of social engineering
  4. Install anti-malware software to block phishing and malicious website.
  5. Delete any request for financial information or passwords