Chapter 5 Flashcards

1
Q

Malware

A
  • harm, exploit, or damage computers, networks, or devices.
  • steal data or damage systems.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Virus

A
  • attaches to legitimate programs or files.
  • spreads by copying itself when the infected program is run.
  • damage, delete data, cause system malfunctions, and corrupt websites.
    hide in executable files.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Worm

A
  • self-replicating malware that spreads to other computers
  • dont need to attach to programs or files
  • exploits network vulnerabilities to spread independently
  • overload systems and consume bandwidth
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Trojan Horse

A
  • disguises as legitimate software
  • tricked into installing it, thinking it’s safe.
  • create backdoors for other malware, steal data, or take control
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Ransomware

A
  • encrypts or locks the victim’s files/systems
  • demands ransom to restore access
  • cause financial and data loss
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

DOS/DDOS

A

cyberattacks that overload a website or system, making it slow or completely unavailable

DDOS - uses botnet (infected computers from many locations) to attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Prevent DOS (FARM)

A
  • Firewalls and anti-DDoS protection
  • Limit the number of requests per user (rate limiting)
  • Monitor unusual traffic spikes
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Define cryptography, encryption and explain encryption process

A

cryptography: process of hiding info so that only the person the msg is intended for can read
encryption: process of protecting the data by converting it into ciphertext that no one can read

Encryption process
1) theres a digital doc you want to send
2) the document is encrypted by the public key which will scramble or “lock” the document
3) the document is transferred thru the internet. anyone without the private key cannot access the document
4) only the person with the private key can decrypt by converting ciphertext into document again.
5) finally the digital document can be read

How well did you know this?
1
Not at all
2
3
4
5
Perfectly