5.3 Cyber security Flashcards
Brute force attack
The systematic method used by cybercriminals to crack passwords by trial and error with all possible combinations
Word list
A text containing a collection of words used in a brute force attack
Data interception
Attempt to eavesdrop on a wired or wireless network transmission; cybercriminals
Packet sniffing
Method to intercept data, examine data packets being sent over network and send back to cybercrimnal
Wardriving
Using laptop, antenna or gps device to intercept Wifi - signal
Distributed denial of service attack
Denial of service attack(disrupt normal operation of a website, flooding it with requests) in which fake requests come from many computers
Hacking
Act of gaining illegal access to a computer system without the owner’s permission.
Malware
Programs installed on user’s computer with aim of deleting, corrupting or manipulating data illegally
Virus
Programs that replicates itself with intention of deleting or corrupting files causing malfunctions
Worm
Stand-alone malware;can self replicated unlike viruses, contain malicious code that can damage comp system.
Trojan horse
Type of malware that is disguised as legitimate software, but contain malicious code
Spyware
Type of malware that gather’s info by monitoring user’s activities on computer and sends gathered info back to criminal
Adware
Type of malware that attempts to flood the end-user with unwanted advertising, usually not harmful in general
Ransomware
Type of malware that encrypts data on user’s comp and holds data “hostage” asking for ransom
Phishing
Sending out legimate-looking emails deceiving recipients into giving person details to the sender.
Spear phishing
Phishing but targeted on single user
Pharming
Redirecting user to fake website to gain personal data without their knowledge ; disguised(Uses DNS cache poisoning or switching IP addresses for redirection sometimes)
Social engineering
Manipulating people into breaking normal security procedures, to gain access to computer systems or place malware.
Access Levels
Levels of acces in computer system allowing a hierarchy depending on user’s level of security
Anti-spyware
Software that detects and heuristically removes sypware programs on a system, based on particular rules or file structures
Authentication
Proccess of proving user’s identity by using something they know or something unique to them
Biometrics
type of authentication that uses a biological unique human characteristic
Two-step verification
Type of authentication that requires two methods of verification to prove the identity of a user
Firewall
Software or hardware that acts as filter between computer and external network
Typo squatting
Subtle spelling errors in web adresses to decept users into visiting fake websites
Proxy server
Server that acts as intermediary server through which internet requests are processed;often makes use of cache memory to speed up web page access
Privacy settings
Controls available on social networking and other websites which allow users to limit who can access their profile or what they are allowed to see
Secure sockets layer
Security protocol used when sending data over a network
SSL certificate
A form of digital certificate which is used to authenticate a website; providing SSL certificate can be authenticated, any communication or data exchange between browser and website is secure
Describe the steps taken by a cybercriminal when targeting their victim through social engineering
- Victims are identified and researched
2.Victim is contacted and targeting using methods like phishing,pharming or trojan horse - Attack is executed, cybercriminals gets information
- Cybercriminal removes traces
Three features of a typical anti-virus software
Detects and removes virus on device
Prevents user from downloading viruses
Constantly updates it’s “rules” of what a virus is
Explain why firewalls are used
To filter info between web server and user’s computer, to protect computers from cyberthreats such as hacking, malware, phishing and pharming
Four tasks of a firewall
Checks if data transmitted qualifies particular set of data
Helps prevent cyberthreats entering the network or user’s device
Logs all incoming/outgoing “traffic”
Warns users about security issues or potential dangers