5.3 Cyber security Flashcards

You may prefer our related Brainscape-certified flashcards:
1
Q

Brute force attack

A

The systematic method used by cybercriminals to crack passwords by trial and error with all possible combinations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Word list

A

A text containing a collection of words used in a brute force attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Data interception

A

Attempt to eavesdrop on a wired or wireless network transmission; cybercriminals

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Packet sniffing

A

Method to intercept data, examine data packets being sent over network and send back to cybercrimnal

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Wardriving

A

Using laptop, antenna or gps device to intercept Wifi - signal

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Distributed denial of service attack

A

Denial of service attack(disrupt normal operation of a website, flooding it with requests) in which fake requests come from many computers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Hacking

A

Act of gaining illegal access to a computer system without the owner’s permission.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Malware

A

Programs installed on user’s computer with aim of deleting, corrupting or manipulating data illegally

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Virus

A

Programs that replicates itself with intention of deleting or corrupting files causing malfunctions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Worm

A

Stand-alone malware;can self replicated unlike viruses, contain malicious code that can damage comp system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Trojan horse

A

Type of malware that is disguised as legitimate software, but contain malicious code

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Spyware

A

Type of malware that gather’s info by monitoring user’s activities on computer and sends gathered info back to criminal

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Adware

A

Type of malware that attempts to flood the end-user with unwanted advertising, usually not harmful in general

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Ransomware

A

Type of malware that encrypts data on user’s comp and holds data “hostage” asking for ransom

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Phishing

A

Sending out legimate-looking emails deceiving recipients into giving person details to the sender.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Spear phishing

A

Phishing but targeted on single user

17
Q

Pharming

A

Redirecting user to fake website to gain personal data without their knowledge ; disguised(Uses DNS cache poisoning or switching IP addresses for redirection sometimes)

18
Q

Social engineering

A

Manipulating people into breaking normal security procedures, to gain access to computer systems or place malware.

19
Q

Access Levels

A

Levels of acces in computer system allowing a hierarchy depending on user’s level of security

20
Q

Anti-spyware

A

Software that detects and heuristically removes sypware programs on a system, based on particular rules or file structures

21
Q

Authentication

A

Proccess of proving user’s identity by using something they know or something unique to them

22
Q

Biometrics

A

type of authentication that uses a biological unique human characteristic

23
Q

Two-step verification

A

Type of authentication that requires two methods of verification to prove the identity of a user

24
Q

Firewall

A

Software or hardware that acts as filter between computer and external network

25
Q

Typo squatting

A

Subtle spelling errors in web adresses to decept users into visiting fake websites

26
Q

Proxy server

A

Server that acts as intermediary server through which internet requests are processed;often makes use of cache memory to speed up web page access

27
Q

Privacy settings

A

Controls available on social networking and other websites which allow users to limit who can access their profile or what they are allowed to see

28
Q

Secure sockets layer

A

Security protocol used when sending data over a network

29
Q

SSL certificate

A

A form of digital certificate which is used to authenticate a website; providing SSL certificate can be authenticated, any communication or data exchange between browser and website is secure

30
Q

Describe the steps taken by a cybercriminal when targeting their victim through social engineering

A
  1. Victims are identified and researched
    2.Victim is contacted and targeting using methods like phishing,pharming or trojan horse
  2. Attack is executed, cybercriminals gets information
  3. Cybercriminal removes traces
31
Q

Three features of a typical anti-virus software

A

Detects and removes virus on device
Prevents user from downloading viruses
Constantly updates it’s “rules” of what a virus is

32
Q

Explain why firewalls are used

A

To filter info between web server and user’s computer, to protect computers from cyberthreats such as hacking, malware, phishing and pharming

33
Q

Four tasks of a firewall

A

Checks if data transmitted qualifies particular set of data
Helps prevent cyberthreats entering the network or user’s device
Logs all incoming/outgoing “traffic”
Warns users about security issues or potential dangers