8.1.3- Technical Threats 1 Flashcards

1
Q

What is hacking?

A

Unauthorised access to computer systems or networks to exploit vulnerabilities for malicious purposes through brute force attacks, exploiting software vulnerabilities and more

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the impacts of hacking and how can it be prevented?

A

Data breaches, system damage, financial losses, and reputational damage, which can be prevented through strong passwords, multi-factor authentication, conducting regular security checks, and security patches, which are updates to fix vulnerabilities and strengthen defenses in software or systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is malware?

A

Malicious software designed to infiltrate, damage, or gain unauthorized access to computer systems by spreading through infected email attachments or malicious websites. It can replicate itself, steal sensitive information, encrypt files for ransom, or display unwanted advertisements, like viruses, worms, trojans, spyware, ransomware, and adware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is a virus?

A

Malicious software that attaches itself to legitimate programs or files to harm the operation of a computer system by deleting files

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is a worm?

A

It’s similar to viruses, but doesn’t need to attach itself to a file, as it can self-replicate and spread on its own through an internet connection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is a trojan?

A

Malicious software disguised as legitimate software, tricking users into installing it, and then allowing attackers to gain unauthorized access to the infected system to steal sensitive information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is spyware?

A

Malicious software that secretly gathers information about a user’s activities on a computer or device without the user’s knowledge or consent.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is ransomware?

A

Malicious software that encrypts files or locks access to a victim’s computer system, demanding ransom in exchange for restoring access or decrypting the files.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

> What is adware?

A

Software that automatically displays or downloads advertisements onto a user’s device, without their consent to generate revenue for the adware developer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are the impacts of malware and how can it be prevented?

A

Data loss, financial losses, system downtime, and damage to reputation, which can be prevented by individuals and organizations implementing strong antivirus software, keeping software updated, being cautious when downloading files or clicking on links, and implementing network firewalls and intrusion detection systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

> What is social engineering?

A

Manipulating individuals to reveal confidential and personal information or perform actions that compromise security through psychological manipulation, impersonation, or deception to exploit human behaviour and gain access to sensitive information. Two main examples are phishing and pharming.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is phishing?

A

When attackers attempt to deceive individuals into disclosing sensitive information, like passwords or financial details, by impersonating legitimate organisations through emails, messages, or websites.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is pharming?

A

A cyber-attack that redirects users to a fraudulent website without their knowledge, by manipulating DNS settings or using malware, to collect sensitive information or spread malicious content.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are the impacts of social engineering and how can it be prevented?

A

Unauthorized access to systems, data breaches, and financial losses, which can be prevented by educating employees about social engineering tactics, using multi-factor authentication, and enforcing strict access controls.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is a Man-in-the-Middle Attack?

A

When an attacker intercepts communication between two or more parties without their knowledge and modifying it before forwarding it to the intended recipient

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are the impacts of a Man-in-the-Middle-Attack and how can it be prevented?

A

Sensitive information like login credentials, financial data, or personal information being stolen, which can be prevented through encryption protocols like HTTPS, using VPNs (virtual private networks) for secure communication, and deploying intrusion detection systems