Chapter 4: E - safety Flashcards

1
Q

what is social engineering

A
  • manipulation technique that exploits human error to get private information
  • tend to lure unsuspecting users into exposing data, spreading malware infections, or giving access to restricted systems
  • built around how people think and act. (Once an attacker understands what motivates a user’s actions, they can deceive and manipulate the user effectively. )
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

how does social engineering work //

tactics

A
  • gather bg info
  • establishing a relationship or initiating an interaction, started by building trust.
  • Exploit the victim once trust and a weakness are established to advance the attack.
  • Disengage once the user has taken the desired action
  • urgency
  • trust
  • “shoulder surf” users working on their tablets or laptops. Doing so can result in a large number of passwords and usernames, all without sending an email or writing a line of virus code.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

phishing

A
spam/mass
spear (personalized info, target high value 
Caution w links 
Sender?
Link legit?
spellimg/grammar
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

pharming

A

Obtain personal info
Infect legit web w malicious code,, redirect to bogus ver
Web address?
Secure ssl ,, https

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Smishing

A

Sms phishing

- phone no. or link

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Vishing

A

Alerting the victim to an issue w their account or

Advising the victim of a profitable gain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Malware: Trojan horse

A
  • malicious comp program
  • disguise itsled as diff application
  • act similar to comp virus
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

worm

A
  • small comp program
  • find securiy hole, replicate itself
  • in piece of software or OS
  • make things slow
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Adware

A
  • ad supported software
  • software program used to display, ads, target users by analyzing the web
  • bundled w legit software
  • hard to delete
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Malicious bot

A
  • automated
  • carry out completely, repetitive tasks
  • spam bots
  • zombie bots
  • bot network
  • chatter bot
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

How to avoid malware

A
  • ! Only open legit programs/ emails/ messages
  • install firewall ( monitor internet traffic )
  • antivirus
  • wifi
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Rootkit

A
  • comp program
  • gain admin access to victims computer
  • installed cuz pw is cracked
  • stop comp from recognizing rootkit
  • victim will not know that someone elsehas complete Access
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Ransomware

A
  • restricts users access to files / comp system
  • demand a ransom be paid in order to access comp system
  • files either gone or encrypted
  • enter similar to Trojan horse
  • Falsely claim that the system had been used for illegal activities
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

repetitive strain injury

A
  • repetitive movements

- need good posture

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

back ache

A

-

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

deep vein thrombosis

A
  • blood clot

-