Chapter 14 Flashcards

1
Q

Define social engineering.

A

Psychologically tricking people into divulging information or doing things.

-Blagging
-Phishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Define blagging

A

Hacker speaks to victim directly and creates a scenario to get the victim to divulge info.
e.g. pretending to be a bank employee

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Define Phishing

A

Mass sending hoax emails falsely claiming to by a service. Usually contains a URL link to a fake website to collect personal info

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Qualities of phishing emails…(5)

A

-Create urgency
-Poorly written (spelling/grammar)
-Impersonal
-Fake URL Links/sus attachments containing malware
-Suspicious sender email address trying to look genuine

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Define Malware

A

Malicious software that..
-Gains unauthorized access to the network
-Gathers information to ransom/sell

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

List 6 types of malware

A

-Pharming
-Virus
-Worms
-Trojan
-Spyware
-Adware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Define Pharming

A

Malware that changes the DNS cache on a computer so the user thinks they have been taken to a genuine website, but the website is actually fake

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Define Pharming

A

Malware that changes the DNS cache on a computer so the user thinks they have been taken to a genuine website, but the website is actually fake

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

How to prevent pharming

A

Check the http address
Check for secure https connection
check site’s security certificate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Define Virus

A

Programs that hide within another file. They replicate and spread into other files which can be passed on to other computers. Can corrupt data on a disk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Define worms

A

program that replicates and spreads to other computers independently.
Can produce 1000s of copies, taking up a processor and network bandwidth, reducing performance.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Define trojan

A

Malware disguised as a genuine program.
Installed by a user who thinks that it is real.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Define spyware

A

Malware that spies on a computer to send data back to hacker.
Could contain keyloggers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Define adware

A

Programs that display pop up adverts and redirect search requests to advertising website.
Collects advertising data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

How to protect your computer(9)

A

-Install anti-(malware) software
-Install a firewall
-Ensure OS is up to date
-Ensure anti-(malware) software can scan email attachments
-Use adware removal software
-Avoid opening attachments from unknown sources
-Avoid clicking on email links
-Read t+cs of free software. Don’t click on pop-ups, only close them

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is brute force attack?

A

Trial and error method of obtaining authentication details generated by software

16
Q

What is Distributed denial of service attack?

A

Spamming login attempts to to bring down an online service. Hackers can recruit other computers using malware aid in the attack.

17
Q

What is Data interception and theft attack?

A

Intercepting data as it travels across a network by using packet sniffers.

18
Q

What is SQL injection?

A

Using SQL commands which bypass login requirements and gain access to the database

19
Q

What is penetration testing?

A

A company using white-hat hackers to form mock attacks to identify security weaknesses and the ability to respond to their attack.

20
Q

What is Black box testing?

A

Penetration testing done but with no information about the network. This provides a more realistic scenarios and weaknesses

21
Q

What is white box testing?

A

Penetration test done with knowledge of the network.

22
Q

What are network policies?

A

Rules to follow if an attack occurs.
e.g. installing and keeping up to data anti malware software.

23
Q

What are heuristics?

A

Recognizing behaviors of a malware program, rather than just comparing it against a malware list

24
Q

Physical countermeasures to cyberthreats?

A

-setting user access levels depending on employees responsibilities.
-Long, complicated and regularly changed passwords with numbers + symbols.
-Hiring security guards

25
Q

How does network encryption work?

A

1) Receiver generates large number with 2 factors assigning a public key and a private key.
2)Receiver broadcasts public key.
3)Sender encrypts message with public key.
4)Only the sender know the private key and can decrypt the message.