5.3 cyber security Flashcards

1
Q

process of brute-force attack

A
  • hacker systematically try
  • all diff combos of letters, numbers, symbols
  • until eventually find password
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

aim of carrying out brute-force attack

A

figure out passwork

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

process of data interception

A
  • steal data by tapping into wired/wireless communication link
  • wardriving (wireless)
  • packet sniffing (wired)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

aim of data interception

A
  • compromise privacy
  • obtain confidential information
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

explain wardriving

A

locating and using wireless internet connections illegally

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

explain packet sniffing

A
  • uses packet sniffers
  • examine packets sent over a line
  • all data collected sent back to attacker
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

process of DDoS attack

A
  • flood network with useless spam traffic
  • server can only handle finite number of requests
  • so server fails as result, struggles to respond to all requests
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

explain how the spam traffic works in DDoS attack

A
  • originates from many diff comptuers (hard to block traffic)
  • network of computers infected with malware called bots
  • send multiple requests to access web server all at same time
  • while bot not being used, called zombie
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

aim of DDoS attack

A
  • prevent users from accessing part of network
  • notably, internet server
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

process of hacking

A

gaining unauthorised access to computer system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

aim of hacking

A
  • gain personal info
  • data change, corrupt, passed on
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

types of malware

A
  • virus
  • ransomware
  • adware
  • trojan horse
  • spyware
  • worms
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

explain virus

A
  • programs that can replicate themselves
  • delete or corrupt files
  • cause computer to malfunction
  • need active host program on target computer before can actually run and cause harm (need to be executed by trigger)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

explain ransomware

A
  • attackers encrypt users data
  • until certain amount of money paid
  • then, decryption key sent to user
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

explain adware

A

display unwanted ads on user screen

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

explain trojan horse

A
  • program disguised as legitimate software
  • used to invite other malware, often installed via trojan horse malware
17
Q

explain spyware

A
  • software that gathers info by monitoring user activity on computer
  • send back to cybercriminal who originally sent spyware
  • include web browsing activities, personal data
18
Q

explain worms

A
  • programs that can replicate themselves
  • intention of corrupting entire network instead of computer alone
  • no need for active host program
19
Q

process of pharming

A
  • attacker install malicious code on computer
  • redirects user to fake websites
20
Q

process of phishing

A
  • attackers send legitimate-looking emails
  • bait user into giving out info
21
Q

process of social engineering

A
  • attacker creates social situation
  • leads to victim giving out details
22
Q

what is malware

A

malicious software

23
Q

aim of pharming

A

give login details and other personal details

24
Q

aim of phishing

A

give out personal information

25
Q

aim of social engineering

A

give out personal details

26
Q

how do access levels keep data safe

A

different level of access for diff people

27
Q

what are the types of anti-malware

A

anti-virus, anti-spyware

28
Q

features of anti-virus software

A
  • check software/files before run/loaded on computer
  • compares possible virus against database of known viruses
  • any files/programs potentially infected put into quarantine
29
Q

what does anti-spyware do

A

detects and removes spyware programs

30
Q

types of authentication

A
  • username and password
  • biometric
  • two-step verification
31
Q

how does automating software updates help keep data safe

A
  • contain patches that update software security
  • improve software performance
32
Q

what are firewalls

A
  • either software or hardware
  • sits between user computer and external network
  • primary defense against hacking
33
Q

tasks of firewall

A
  • examine traffic between user comp and public network
  • log all incoming and outgoing traffic and give user warning if security issue
34
Q

how do proxy servers work

A
  • intermediate between user and web server
  • keep user IP address secret
  • allow internet traffic to be filtered
  • can act as firewalls
35
Q

diagram for proxy server

36
Q

what is SSL