8.1.3- Technical Threats 1 Flashcards
What is hacking?
Unauthorised access to computer systems or networks to exploit vulnerabilities for malicious purposes through brute force attacks, exploiting software vulnerabilities and more
What are the impacts of hacking and how can it be prevented?
Data breaches, system damage, financial losses, and reputational damage, which can be prevented through strong passwords, multi-factor authentication, conducting regular security checks, and security patches, which are updates to fix vulnerabilities and strengthen defenses in software or systems
What is malware?
Malicious software designed to infiltrate, damage, or gain unauthorized access to computer systems by spreading through infected email attachments or malicious websites. It can replicate itself, steal sensitive information, encrypt files for ransom, or display unwanted advertisements, like viruses, worms, trojans, spyware, ransomware, and adware
What is a virus?
Malicious software that attaches itself to legitimate programs or files to harm the operation of a computer system by deleting files
What is a worm?
It’s similar to viruses, but doesn’t need to attach itself to a file, as it can self-replicate and spread on its own through an internet connection
What is a trojan?
Malicious software disguised as legitimate software, tricking users into installing it, and then allowing attackers to gain unauthorized access to the infected system to steal sensitive information
What is spyware?
Malicious software that secretly gathers information about a user’s activities on a computer or device without the user’s knowledge or consent.
What is ransomware?
Malicious software that encrypts files or locks access to a victim’s computer system, demanding ransom in exchange for restoring access or decrypting the files.
> What is adware?
Software that automatically displays or downloads advertisements onto a user’s device, without their consent to generate revenue for the adware developer
What are the impacts of malware and how can it be prevented?
Data loss, financial losses, system downtime, and damage to reputation, which can be prevented by individuals and organizations implementing strong antivirus software, keeping software updated, being cautious when downloading files or clicking on links, and implementing network firewalls and intrusion detection systems.
> What is social engineering?
Manipulating individuals to reveal confidential and personal information or perform actions that compromise security through psychological manipulation, impersonation, or deception to exploit human behaviour and gain access to sensitive information. Two main examples are phishing and pharming.
What is phishing?
When attackers attempt to deceive individuals into disclosing sensitive information, like passwords or financial details, by impersonating legitimate organisations through emails, messages, or websites.
What is pharming?
A cyber-attack that redirects users to a fraudulent website without their knowledge, by manipulating DNS settings or using malware, to collect sensitive information or spread malicious content.
What are the impacts of social engineering and how can it be prevented?
Unauthorized access to systems, data breaches, and financial losses, which can be prevented by educating employees about social engineering tactics, using multi-factor authentication, and enforcing strict access controls.
What is a Man-in-the-Middle Attack?
When an attacker intercepts communication between two or more parties without their knowledge and modifying it before forwarding it to the intended recipient