5.3 - Cyber Security Flashcards
What are brute force attacks? [3]
- type of cyber security attack
- tries to guess a password or encryption key
- does this by trying every possible combination of characters
What is data interception? [3]
- type of cyber security attack
- steals data as it’s being transmitted between 2 computers
- uses packet sniffing
What is packet sniffing? [3]
- cybercriminals examine data packets being sent over a network using this
- it find the contents of the data packet
- it is then sent back to the cybercriminal
What are DDOS attacks? [3]
- type of cyber security attack
- floods websites and servers with internet traffic
- this prevents users from accessing online services and sites
What is botnet? [2]
network of compromised computers controlled by hacker
What is hacking? [3]
- type of cyber security attack
- they get illegal access to computer system
- without the user’s permission
What is ethical hacking? [3]
- legal hacking
- used to fix flaws of computer systems and networks
- gains access to them
What does DDOS stand for? [4]
Distributed Denial of Service
What is malware? [3]
- programs installed on a user’s computer
- aims to delete, corrupt, or manipulate data illegally
What are the 6 types of malware? [6]
- virus
- worms
- trojan horse
- spyware
- adware
- ransomware
What is a virus? [3]
- programs copy themselves
- causes computer to malfunction
- requires an active host in the computer before causing damage
What is a worm? [3]
- stand alone malware
- can corrupt whole networks
- doesn’t need an active host
What do worms come as? [1]
message attachments
What is a trojan horse? [3]
- program disguised as legitimate
- has to be executed by user
- after installing it = access to user’s personal information
What does a trojan horse come as? [1]
What is spyware? [3]
- software that monitors user’s activities on computer
- gathers unformation
- sends back to cybercriminal
What is adware? [3]
- floods device with unwanted ads
- some could be safe
- some might steal your data
What is ransomware? [3]
- holds PC hostage
- demands money
- demands payment for the release of your data files
What is phishing? [3]
- gets you to click on harmful links via email, texts and phone calls
- links lead to fake websites that look real
- login credentials = hacker steals it
What does phishing use? [3]
- emails
- texts
- phone calls
What do phishing sources often be like? [3]
- appear to be from a trusted source
- create a sense of urgency
- contain grammatical errors or typos
What is pharming? [3]
- changes your computer’s settings
- changes DNS system
- makes it so that it automatically redirects you to a harmful site
How can pharming occur? [2]
- infecting your computer with malware
- by compromising a DNS server
What is social engineering? [2]
- psychological manipulation
- tricks you into revealing information or taking actions you wouldn’t usually take