5.3 Cyber Security Threats Flashcards

1
Q

What is a virus?

A
  • A virus is a program or piece of software
  • It is a program that copies itself …
    • … in order to damage or destroy files files
  • Often causes the computer to crash
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

How can I protect myself from a virus?

A
  • Install anti-virus software
  • Don’t use software from uknown sources
  • Be careful when opening attachments
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What does antivirus software do?

A
  • Scans files for virus
  • Also checks data before it is downloaded
  • Can constantly run in the background
  • Can run scheduled scans
  • Automatically updates virus definitions
  • Can quarantine or delete a virus
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is a Spyware?

A
  • Spyware is a program or piece of software
  • It records the key presses on the users keyboard …
    • … and sendsback the key presses to the creator
  • Data can be analysed to find user passwords
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

How can I protect myself from spyware?

A
  • Install anti-spyware software
  • Input random characters (of a password)
  • Use drop down menus (instead of key presses)
  • Generate time sensitive pins that change regularly
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What does anti spyware software do?

A
  • Finds and removes spyware installed on a computer
  • Stops the recording of key presses …
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is a Hacking?

A
  • The act of gaining illegal access to a computer system …
    • …without the owners consent or knowledge
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

How can I protect myself from hacking?

A
  • Install anti-hacking software
  • Use firewalls
  • Use strong passwords
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are the consequences of hacking?

A
  • Can lead to identity theft
  • Can lead to the loss of personal information
  • Data can be deleted, changed or corrupted
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is a hacker?

A

A person who tries to gain illegal access to a computer or a network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is a cracker?

A

Someone who edits program source code usually for a malicious purpose

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is cracking?

A

The act of illegally changing the source code of a program so that it can be exploited for another use

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Explain what is meant by a DOS attack

A
  • Denial of Service (DoS) attack
  • A large number of requests are sent to the network or server all at the same tim
  • Designed to flood a network/server with useless traffic/requests
  • The network/server will come to a halt trying to deal with all the traffic/requests
  • Prevents users from gaining access to a website/server
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are the signs of a DOS attack?

A
  • Slow network performance e.g. accessing websites
  • Unable to access particular websites or files
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

How can you prevent a DOS attack?

A
  • Using an up-to-date malware/virus checker
  • Setting up a firewalls to restrict traffic to a server
  • Applying email filters to manage unwanted spam.
  • Be careful when opening attachments
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is a Phishing?

A
  • Creator sends a legitimate looking email
  • User then clinks on a link and they are sent to a fake website
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

How can I protect myself from phishing?

A
  • ISP’s can filter out phishing emails
  • Don’t click on links
  • Look out for spelling errors
  • Look out for lack of personalisation e.g. Dear customer
  • Check the URL (link) is correct
18
Q

What are the consequences of pharming?

A
  • Steals personal data when user enters details
  • This leads to fraud or theft
19
Q

What are the consequences of phishing?

A
  • Steals personal data when user enters details
  • This leads to fraud or theft
20
Q

What is a Pharming?

A
  • Malicious code installed on a computer or web server
  • Code redirects the user to a fake website
  • Hacker can change IP address on the DNS server
21
Q

How can I protect myself from Pharming?

A
  • Install anti-spyware/virus software
  • Check the URL of any links you click on
22
Q

What is a Wardriving?

A
  • Locating and using wifi connections illegally
  • Equipment needed is a …
    • Laptop
    • Wireless Network Card
    • Antenna to pick up wireless signals
23
Q

How can I protect myself from Wardriving?

A
  • Use of WEP encryption
  • Strong password protection for router
  • Use of firewall to prevent outside access
24
Q

What are the consequences of wardriving?

A
  • Steals a users download/data allowance
  • Can access wireless network to steal personal data
25
What is a SPAM?
* Junk/ unsolicited email * Sent to large numbers of people
26
How can I prevent SPAM?
* Use a spam filter * Do not give out your email address * Keep an eye out for tick boxes when signing up
27
What is SPAM used for?
* Advertising * Spreading malware
28
What is a trojan horse?
A program which is often disguised as legitimate software … but with malicious instructions embedded within it. They need to be executed by the end user Once installed they can steal personal information Often used to install spyware/ransomware Often arrive as message attachments
29
How can I protect myself from a trojan horse?
Install anti-malware software Don't use software from unknown sources Be careful when opening attachments
30
What is a worm?
Stand-alone malware that can self-replicate Intention is to spread to other computers and corrupt networks They replicate without being triggered by an end user (unlike virus') Often arrive as message attachments
31
How can I protect myself from a worm?
Install anti-malware software Don't use software from unknown sources Be careful when opening attachments
32
What is adware?
Attempts to flood the end-user with unwanted advertising It can generate advertising pop-ups It can hijack a browser and redirect it to promotional advertising It can be difficult to identify using anti-malware software
33
How can I protect myself from adware?
Install anti-malware software Don't use software from unknown sources Be careful when opening attachments
34
What is ransomware?
Programs that encrypt data on a user's computer … … restricting access to the computer until a ransom is paid The cybercriminal waits until the ransom money is paid … … then , sometimes, the decryption key is sent to the user
35
How can I protect myself from ransomware?
Install anti-malware software Don't use software from unknown sources Be careful when opening attachments
36
What is a DDoS attack
A distributed denial of service attack. The spam traffic originates from many different computers (making it harder to stop)
37
What is social engineering?
Manipulating people into breaking normal security procedures (e.g. giving away a password) … … in order to gain illegal access to computer systems or to install malware
38
What human emotions do social engineers exploit?
* *Fear** - the user is panicked into believing their computer is in immediate danger * *Curiosity** - they may find an infected memory stick lying around and try to use it * *Trust**: a belief that genuine sounding companies and people are legitimate
39
Social Engineering - what are the 5 main types of threat?
* *Instant Messaging** - Malicious links are embedded into instant messages; * *Scareware** - For example a pop-up message that claims that the users computer is infected with a virus; * *Phishing scams** - Tricked to open a link in an email that redirects their browser to a fake website * *Baiting** - The cybercriminal leaves a malware-infected memory stick somewhere where it can be found * *Phone Calls** - an “IT professional” calls someone and pretends their device is compromised to get them to download malicious software
40
What is a brute force attack?
When a hacker tries to crack your password by … … systematically trying all of the different possible combinations To reduce the number of attempts you can * Use a list of common passwords and try these * Use a strong word list to generate passwords