Chapter 4 Flashcards
what is social engineering
- manipulation technique that exploits human error to get private information
- tend to lure unsuspecting users into exposing data, spreading malware infections, or giving access to restricted systems
- built around how people think and act. (Once an attacker understands what motivates a user’s actions, they can deceive and manipulate the user effectively.)
phishing
spam/mass
spear (personalized info, target high value
Caution w links
Sender?
Link legit?
pharming
Obtain personal info
Infect legit web w malicious code, redirect to bogus
Web address?
Secure ssl, https
Smishing
Sms phishing
- phone no. or link
Vishing
Alerting the victim to an issue w their account or
Advising the victim of a profitable gain
Malware: Trojan horse
- malicious comp program
- disguise it self as diff application
- act similar to comp virus
worm
- small comp program
- find security hole, replicate itself
- in piece of software or OS
- make things slow
Adware
- ad supported software
- software program used to display, ads, target users by analyzing the web
- bundled w legit software
- hard to delete
Malicious bot
- automated
- carry out completely, repetitive tasks
- spam bots
- zombie bots
- bot network
- chatter bot
How to avoid malware
- Only open legit programs/ emails/ messages
- install firewall (monitor internet traffic )
- antivirus
Rootkit
- comp program
- gain admin access to victims computer
- installed because password is cracked
- stop comp from recognizing rootkit
- victim will not know that someone else has complete Access
Ransomware
- restricts users access to files / comp system
- demand a ransom be paid in order to access comp system
- files either gone or encrypted
- enter similar to Trojan horse
- Falsely claim that the system had been used for illegal activities
repetitive strain injury
- repetitive movements
- need good posture
What is a hacker?
A hacker is someone who tries to gain unauthorized access to your computer with the intention of corrupting or stealing data
What is spamming?
Sending bulk emails such as adverts for products. A large proportion of bandwidth is used so time is wasted opening and reading such emails
What is Phishing?
Sending emails that appear to be from a reliable source. Users will often be asked to update their info and this info will then be used by hackers.
What is malware?
Malicious software that is downloaded onto a computer unintentionally by a user
Name 3 types of malware?
- Trojan horses
- worms
- spyware
What is a virus?
A program which is designed to damage a computer system
How can you protect yourself from viruses?
Installing an antivirus program that will regularly scan your computer for threats.
What is a trojan horse?
It gains entry into a user’s computer ‘ in disguise’ . Once installed some can do major damage like deleting files or displaying annoying pop-ups.
What is a worm?
A worm spreads around from computer to computer in a network. It does this by replicating itself.
What are the problems with worm viruses?
Worms require bandwidth which results in slower data transmission speeds
What is a key logger?
It records a user’s keystrokes. The user is unaware that this is happening. it is used to steal personal info from the user (also used by employers to monitor employees’ activities)
What is spyware?
It uses the internet connection to monitor things like the websites a user visit. It can also be used to gather personal and bank details
What are the problems with spyware?
It uses valuable memory in some cases the info is sold to a third-party
What is data encryption?
The process of scrambling data using a ‘key’ before it is transmitted onto a network
What does the network manager allocate every user?
- A unique username
- users can choose their own password
Name 4 ways networks are protected?
- usernames and passwords
- access levels
- backup
- firewall
Name and describe the three levels of access to files
- Read only: users can only view the file
- Read and copy : users can view and replicate the file
- Read and write : users can view and edit the files
How are backups used to protect a network?
Backup copies of data are stored on a variety of storage media in safe locations away from the network server e.g and external hard drive
What is a firewall?
A piece of software or hardware that is used to monitor and filter data that is entering or leaving a network.
What can firewalls do?
- prevent hackers from entering the network via the internet
- prevents viruses and spam from entering the network
- prevents users downloading undesirable content
What is a communication protocol?
This is a set of rules used to allow different computers from different manufacturers to communicate
What transfer protocol is used for the internet?
TCP/IP (transmission control protocol/ internet protocol)
What does FTP stand for and what is it used for?
(File transport protocol) allows users to send and receive files over the internet.
What is Http and what does it stand for?
(hyper text transfer protocol) used by the WWW to identify and transfer web pages using the internet.
How does Http work?
When the user enters a URL this protocol sends a command to the web server to request the required web page.
What are the main uses of Https?
e-commerce such as:
- credit card transactions
- bank information
How is Https made safer?
Data is encrypted when being transferred via this method