5.3 Cyber security Flashcards
Brute force attack
The systematic method used by cybercriminals to crack passwords by trial and error with all possible combinations
Word list
A text containing a collection of words used in a brute force attack
Data interception
Attempt to eavesdrop on a wired or wireless network transmission; cybercriminals
Packet sniffing
Method to intercept data, examine data packets being sent over network and send back to cybercrimnal
Wardriving
Using laptop, antenna or gps device to intercept Wifi - signal
Distributed denial of service attack
Denial of service attack(disrupt normal operation of a website, flooding it with requests) in which fake requests come from many computers
Hacking
Act of gaining illegal access to a computer system without the owner’s permission.
Malware
Programs installed on user’s computer with aim of deleting, corrupting or manipulating data illegally
Virus
Programs that replicates itself with intention of deleting or corrupting files causing malfunctions
Worm
Stand-alone malware;can self replicated unlike viruses, contain malicious code that can damage comp system.
Trojan horse
Type of malware that is disguised as legitimate software, but contain malicious code
Spyware
Type of malware that gather’s info by monitoring user’s activities on computer and sends gathered info back to criminal
Adware
Type of malware that attempts to flood the end-user with unwanted advertising, usually not harmful in general
Ransomware
Type of malware that encrypts data on user’s comp and holds data “hostage” asking for ransom
Phishing
Sending out legimate-looking emails deceiving recipients into giving person details to the sender.
Spear phishing
Phishing but targeted on single user
Pharming
Redirecting user to fake website to gain personal data without their knowledge ; disguised(Uses DNS cache poisoning or switching IP addresses for redirection sometimes)
Social engineering
Manipulating people into breaking normal security procedures, to gain access to computer systems or place malware.
Access Levels
Levels of acces in computer system allowing a hierarchy depending on user’s level of security
Anti-spyware
Software that detects and heuristically removes sypware programs on a system, based on particular rules or file structures
Authentication
Proccess of proving user’s identity by using something they know or something unique to them
Biometrics
type of authentication that uses a biological unique human characteristic
Two-step verification
Type of authentication that requires two methods of verification to prove the identity of a user
Firewall
Software or hardware that acts as filter between computer and external network