Chapter 4: E - safety Flashcards
1
Q
what is social engineering
A
- manipulation technique that exploits human error to get private information
- tend to lure unsuspecting users into exposing data, spreading malware infections, or giving access to restricted systems
- built around how people think and act. (Once an attacker understands what motivates a user’s actions, they can deceive and manipulate the user effectively. )
2
Q
how does social engineering work //
tactics
A
- gather bg info
- establishing a relationship or initiating an interaction, started by building trust.
- Exploit the victim once trust and a weakness are established to advance the attack.
- Disengage once the user has taken the desired action
- urgency
- trust
- “shoulder surf” users working on their tablets or laptops. Doing so can result in a large number of passwords and usernames, all without sending an email or writing a line of virus code.
3
Q
phishing
A
spam/mass spear (personalized info, target high value Caution w links Sender? Link legit? spellimg/grammar
4
Q
pharming
A
Obtain personal info
Infect legit web w malicious code,, redirect to bogus ver
Web address?
Secure ssl ,, https
5
Q
Smishing
A
Sms phishing
- phone no. or link
6
Q
Vishing
A
Alerting the victim to an issue w their account or
Advising the victim of a profitable gain
7
Q
Malware: Trojan horse
A
- malicious comp program
- disguise itsled as diff application
- act similar to comp virus
8
Q
worm
A
- small comp program
- find securiy hole, replicate itself
- in piece of software or OS
- make things slow
9
Q
Adware
A
- ad supported software
- software program used to display, ads, target users by analyzing the web
- bundled w legit software
- hard to delete
10
Q
Malicious bot
A
- automated
- carry out completely, repetitive tasks
- spam bots
- zombie bots
- bot network
- chatter bot
11
Q
How to avoid malware
A
- ! Only open legit programs/ emails/ messages
- install firewall ( monitor internet traffic )
- antivirus
- wifi
12
Q
Rootkit
A
- comp program
- gain admin access to victims computer
- installed cuz pw is cracked
- stop comp from recognizing rootkit
- victim will not know that someone elsehas complete Access
13
Q
Ransomware
A
- restricts users access to files / comp system
- demand a ransom be paid in order to access comp system
- files either gone or encrypted
- enter similar to Trojan horse
- Falsely claim that the system had been used for illegal activities
14
Q
repetitive strain injury
A
- repetitive movements
- need good posture
15
Q
back ache
A
-
16
Q
deep vein thrombosis
A
- blood clot
-