5.3 Cyber security Flashcards
Brute force attack
The systematic method used by cybercriminals to crack passwords by trial and error with all possible combinations
Word list
A text containing a collection of words used in a brute force attack
Data interception
Attempt to eavesdrop on a wired or wireless network transmission; cybercriminals
Packet sniffing
Method to intercept data, examine data packets being sent over network and send back to cybercrimnal
Wardriving
Using laptop, antenna or gps device to intercept Wifi - signal
Distributed denial of service attack
Denial of service attack(disrupt normal operation of a website, flooding it with requests) in which fake requests come from many computers
Hacking
Act of gaining illegal access to a computer system without the owner’s permission.
Malware
Programs installed on user’s computer with aim of deleting, corrupting or manipulating data illegally
Virus
Programs that replicates itself with intention of deleting or corrupting files causing malfunctions
Worm
Stand-alone malware;can self replicated unlike viruses, contain malicious code that can damage comp system.
Trojan horse
Type of malware that is disguised as legitimate software, but contain malicious code
Spyware
Type of malware that gather’s info by monitoring user’s activities on computer and sends gathered info back to criminal
Adware
Type of malware that attempts to flood the end-user with unwanted advertising, usually not harmful in general
Ransomware
Type of malware that encrypts data on user’s comp and holds data “hostage” asking for ransom
Phishing
Sending out legimate-looking emails deceiving recipients into giving person details to the sender.