5.3 Cyber security Flashcards

1
Q

Brute force attack

A

The systematic method used by cybercriminals to crack passwords by trial and error with all possible combinations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Word list

A

A text containing a collection of words used in a brute force attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Data interception

A

Attempt to eavesdrop on a wired or wireless network transmission; cybercriminals

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Packet sniffing

A

Method to intercept data, examine data packets being sent over network and send back to cybercrimnal

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Wardriving

A

Using laptop, antenna or gps device to intercept Wifi - signal

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Distributed denial of service attack

A

Denial of service attack(disrupt normal operation of a website, flooding it with requests) in which fake requests come from many computers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Hacking

A

Act of gaining illegal access to a computer system without the owner’s permission.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Malware

A

Programs installed on user’s computer with aim of deleting, corrupting or manipulating data illegally

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Virus

A

Programs that replicates itself with intention of deleting or corrupting files causing malfunctions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Worm

A

Stand-alone malware;can self replicated unlike viruses, contain malicious code that can damage comp system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Trojan horse

A

Type of malware that is disguised as legitimate software, but contain malicious code

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Spyware

A

Type of malware that gather’s info by monitoring user’s activities on computer and sends gathered info back to criminal

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Adware

A

Type of malware that attempts to flood the end-user with unwanted advertising, usually not harmful in general

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Ransomware

A

Type of malware that encrypts data on user’s comp and holds data “hostage” asking for ransom

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Phishing

A

Sending out legimate-looking emails deceiving recipients into giving person details to the sender.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Spear phishing

A

Phishing but targeted on single user

17
Q

Pharming

A

Redirecting user to fake website to gain personal data without their knowledge ; disguised(Uses DNS cache poisoning or switching IP addresses for redirection sometimes)

18
Q

Social engineering

A

Manipulating people into breaking normal security procedures, to gain access to computer systems or place malware.

19
Q

Access Levels

A

Levels of acces in computer system allowing a hierarchy depending on user’s level of security

20
Q

Anti-spyware

A

Software that detects and heuristically removes sypware programs on a system, based on particular rules or file structures

21
Q

Authentication

A

Proccess of proving user’s identity by using something they know or something unique to them

22
Q

Biometrics

A

type of authentication that uses a biological unique human characteristic

23
Q

Two-step verification

A

Type of authentication that requires two methods of verification to prove the identity of a user

24
Q

Firewall

A

Software or hardware that acts as filter between computer and external network

25
Typo squatting
Subtle spelling errors in web adresses to decept users into visiting fake websites
26
Proxy server
Server that acts as intermediary server through which internet requests are processed;often makes use of cache memory to speed up web page access
27
Privacy settings
Controls available on social networking and other websites which allow users to limit who can access their profile or what they are allowed to see
28
Secure sockets layer
Security protocol used when sending data over a network
29
SSL certificate
A form of digital certificate which is used to authenticate a website; providing SSL certificate can be authenticated, any communication or data exchange between browser and website is secure
30
Describe the steps taken by a cybercriminal when targeting their victim through social engineering
1. Victims are identified and researched 2.Victim is contacted and targeting using methods like phishing,pharming or trojan horse 3. Attack is executed, cybercriminals gets information 4. Cybercriminal removes traces
31
Three features of a typical anti-virus software
Detects and removes virus on device Prevents user from downloading viruses Constantly updates it's "rules" of what a virus is
32
Explain why firewalls are used
To filter info between web server and user's computer, to protect computers from cyberthreats such as hacking, malware, phishing and pharming
33
Four tasks of a firewall
Checks if data transmitted qualifies particular set of data Helps prevent cyberthreats entering the network or user's device Logs all incoming/outgoing "traffic" Warns users about security issues or potential dangers