C3 - B - Cyber Security Flashcards
What is Cyber Security?
Cyber security is how individuals and organisations reduce the risk of cyber attack.
Cyber security’s core function is to protect the devices we all use (smartphones, laptops, tablets and computers), and the services we access - both online and at work - from theft or damage.
It’s also about preventing unauthorised access to the vast amounts of personal information we store on these devices, and online.
https://www.ncsc.gov.uk/section/about-ncsc/what-is-cyber-security
What is Malware?
Malware is intrusive software that is designed to damage and destroy computers and computer systems. Malware is a contraction for “malicious software.”
What are examples of Malware?
- Viruses
- Worms
- Trojan Horses
- Ransomware
- Spyware
- Adware
- Rootkit
- Botnet
What are some real-world examples of malware?
- Emotet Trojan
- Wannacry Ransomware
- Stuxnet Worm
- MyDoom Worm
What is a Virus?
A malicious software that attaches itself to a document or file that can execute its code and spread its files.
They will remain dormant when installed, until the host file is open and used.
They are designed to harm the computer’s ability to operate by deleting, corrupting or modifying files.
What is a Worm?
Worms are malicious software that rapidly replicates and spreads to any device within a network. A worm may not cause any damage, but they can cause throttling on the network.
What is a trojan horse?
Named after the Trojans that brought a fake horse to the Greek city of Troy, where they were hiding inside.
This is pretty similar to how the software works, it takes the place of a program, game or cracked file, and inside it will be negative program code which causes damage to the computer.
What is Spyware?
This is malicious software that runs discreetly on a computer, reporting a users action to a remote user. For example, passwords entered. They are typically delivered by trojan horses.
What is Adware?
Adware is malicious software that is used to collect data on your computer usage. While not always dangerous, it can cause issues for your system, for example redirecting a user to unsafe sites. It can also significantly slow down your computer.
What is Ransomware?
Ransomware is malicious software that gains access to sensitive information within a system, encrypts that information so that the user cannot access it, and then demands a financial payout for the data to be released.
Ransomware is commonly part of a phishing scam. By clicking a disguised link, the user downloads the ransomware. The users data is then encrypted with a key the hacker only has access to, and then payment is requested. A user may not get their data back if they have made the payment.
What is Rootkit?
A rootkit is a set of programs that aims to gain root or administrator access to a computer.
What is a Botnet?
Botnet comes from robot network.
In a botnet, a hacker will first infect machines to make zombie devices.
These computers can then be controlled by one central computer.
This gives a hacker free and anonymous access to computers.
Common uses for botnets are: Denial of service attacks, Sending spam.
What is Social Engineering?
The use of deception to manipulate individuals into divulging confidential or personal information that may be used for fraudulent purposes.
What are some of the methods of social engineering?
- Shoulder Surfing
- Tailgating
- Phishing
- Scareware
- Pretexting
- Quid Pro Quo
- Pharming
What is shoulder surfing?
Shoulder surfing is where an attacker looks over a person without their knowledge, in order to collect data from the user as they operate their device.