Chapter 4 Flashcards

1
Q

what is social engineering

A
  • manipulation technique that exploits human error to get private information
  • tend to lure unsuspecting users into exposing data, spreading malware infections, or giving access to restricted systems
  • built around how people think and act. (Once an attacker understands what motivates a user’s actions, they can deceive and manipulate the user effectively.)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

phishing

A

spam/mass
spear (personalized info, target high value

Caution w links
Sender?
Link legit?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

pharming

A

Obtain personal info
Infect legit web w malicious code, redirect to bogus
Web address?
Secure ssl, https

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Smishing

A

Sms phishing

- phone no. or link

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Vishing

A

Alerting the victim to an issue w their account or

Advising the victim of a profitable gain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Malware: Trojan horse

A
  • malicious comp program
  • disguise it self as diff application
  • act similar to comp virus
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

worm

A
  • small comp program
  • find security hole, replicate itself
  • in piece of software or OS
  • make things slow
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Adware

A
  • ad supported software
  • software program used to display, ads, target users by analyzing the web
  • bundled w legit software
  • hard to delete
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Malicious bot

A
  • automated
  • carry out completely, repetitive tasks
  • spam bots
  • zombie bots
  • bot network
  • chatter bot
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

How to avoid malware

A
  • Only open legit programs/ emails/ messages
  • install firewall (monitor internet traffic )
  • antivirus
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Rootkit

A
  • comp program
  • gain admin access to victims computer
  • installed because password is cracked
  • stop comp from recognizing rootkit
  • victim will not know that someone else has complete Access
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Ransomware

A
  • restricts users access to files / comp system
  • demand a ransom be paid in order to access comp system
  • files either gone or encrypted
  • enter similar to Trojan horse
  • Falsely claim that the system had been used for illegal activities
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

repetitive strain injury

A
  • repetitive movements

- need good posture

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is a hacker?

A

A hacker is someone who tries to gain unauthorized access to your computer with the intention of corrupting or stealing data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is spamming?

A

Sending bulk emails such as adverts for products. A large proportion of bandwidth is used so time is wasted opening and reading such emails

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is Phishing?

A

Sending emails that appear to be from a reliable source. Users will often be asked to update their info and this info will then be used by hackers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is malware?

A

Malicious software that is downloaded onto a computer unintentionally by a user

18
Q

Name 3 types of malware?

A
  • Trojan horses
  • worms
  • spyware
19
Q

What is a virus?

A

A program which is designed to damage a computer system

20
Q

How can you protect yourself from viruses?

A

Installing an antivirus program that will regularly scan your computer for threats.

21
Q

What is a trojan horse?

A

It gains entry into a user’s computer ‘ in disguise’ . Once installed some can do major damage like deleting files or displaying annoying pop-ups.

22
Q

What is a worm?

A

A worm spreads around from computer to computer in a network. It does this by replicating itself.

23
Q

What are the problems with worm viruses?

A

Worms require bandwidth which results in slower data transmission speeds

24
Q

What is a key logger?

A

It records a user’s keystrokes. The user is unaware that this is happening. it is used to steal personal info from the user (also used by employers to monitor employees’ activities)

25
Q

What is spyware?

A

It uses the internet connection to monitor things like the websites a user visit. It can also be used to gather personal and bank details

26
Q

What are the problems with spyware?

A

It uses valuable memory in some cases the info is sold to a third-party

27
Q

What is data encryption?

A

The process of scrambling data using a ‘key’ before it is transmitted onto a network

28
Q

What does the network manager allocate every user?

A
  • A unique username

- users can choose their own password

29
Q

Name 4 ways networks are protected?

A
  • usernames and passwords
  • access levels
  • backup
  • firewall
30
Q

Name and describe the three levels of access to files

A
  • Read only: users can only view the file
  • Read and copy : users can view and replicate the file
  • Read and write : users can view and edit the files
31
Q

How are backups used to protect a network?

A

Backup copies of data are stored on a variety of storage media in safe locations away from the network server e.g and external hard drive

32
Q

What is a firewall?

A

A piece of software or hardware that is used to monitor and filter data that is entering or leaving a network.

33
Q

What can firewalls do?

A
  • prevent hackers from entering the network via the internet
  • prevents viruses and spam from entering the network
  • prevents users downloading undesirable content
34
Q

What is a communication protocol?

A

This is a set of rules used to allow different computers from different manufacturers to communicate

35
Q

What transfer protocol is used for the internet?

A

TCP/IP (transmission control protocol/ internet protocol)

36
Q

What does FTP stand for and what is it used for?

A

(File transport protocol) allows users to send and receive files over the internet.

37
Q

What is Http and what does it stand for?

A

(hyper text transfer protocol) used by the WWW to identify and transfer web pages using the internet.

38
Q

How does Http work?

A

When the user enters a URL this protocol sends a command to the web server to request the required web page.

39
Q

What are the main uses of Https?

A

e-commerce such as:

  • credit card transactions
  • bank information
40
Q

How is Https made safer?

A

Data is encrypted when being transferred via this method