5.3 cyber security Flashcards
Brute-Force Attack
- a trial-and-error method used to crack passwords by trying every possible combination until the correct one is found
- Can be carried out manually or automatically by software
Aim of Brute-Force Attack
Steal/view/access data
Delete data
Change data
Solution for Brute force attack
- Use stronger passwords with more characters and symbols (strong/complex passwords)
- Setting a limit for login attempts
Data Interception
This involves stealing data by tapping into a wired or a wireless transmission line
Data Interception aim
steal sensitive information, such as passwords, credit card numbers, or personal data for personal gain
Data Interception is done by Packet Sniffing
HOWWWW? -
Uses Packet sniffers to examine packets sent over a line, all the data collected is sent back to the attacker
How to prevent data interception?
Encryption
strong Passwords
firewall
What does DDoS stand for?
Distributed Denial of Service (DDoS) Attack
DDos definition (4marks)
- A DDoS attack is where multiple computers are used as bots
- They flood a server with lots of requests at the same time which the server can’t respond to; causing it to crash or become unavailable to users
Aim of DDos
to disrupt the normal functioning of a system or network by denying users access
How can u prevent a DDoS attack?
firewall OR proxy server
Hacking
the act of gaining illegal access to a computer system without the user’s permission.
Effect of Hacking (what happens)
data can be deleted, passed on, changed or corrupted
How to prevent Hacking
- Firewalls
- Strong passwords/ user IDs
- Use of anti-hacking software
Malware
Malware is malicious software
VIrus
- is a malware that attaches itself to a legitimate program or file and then
- replicates itself to spread to other programs or files on the computer.
- It can cause damage to the system, including deleting data or damaging hardware and causing it to malfunction
Where viruses are found and how to prevent them
- On email attachments, infected software or websites.
Prevention:
* run up-to-date virus checkers.
* use a firewall
* use a proxy server
* Dont download unoriginal software,
* dont click on unknown links
Worms
- is similar to a virus but is a standalone program that can spread and replicate itself over computer networks.
- takes up storage space
- with the intention of corrupting the entire network
How to prevent worms (1)
Run up-to-date anti-virus programs.
Difference between worms and viruses
Viruses require active hosts and for each end user to initiate the virus, worms dont
Trojan horse
a program that disguises itself as a legitimate program or file, but when installed, it can delete data or damage hardware
How to prevent trojan horse
Very hard as it involves user tricking, so even firewalls and anti-virus software can be useless
Spyware
a software that records all key presses and transmits these to a third-party