Chapter 5 Flashcards
Malware
- harm, exploit, or damage computers, networks, or devices.
- steal data or damage systems.
Virus
- attaches to legitimate programs or files.
- spreads by copying itself when the infected program is run.
- damage, delete data, cause system malfunctions, and corrupt websites.
hide in executable files.
Worm
- self-replicating malware that spreads to other computers
- dont need to attach to programs or files
- exploits network vulnerabilities to spread independently
- overload systems and consume bandwidth
Trojan Horse
- disguises as legitimate software
- tricked into installing it, thinking it’s safe.
- create backdoors for other malware, steal data, or take control
Ransomware
- encrypts or locks the victim’s files/systems
- demands ransom to restore access
- cause financial and data loss
DOS/DDOS
cyberattacks that overload a website or system, making it slow or completely unavailable
DDOS - uses botnet (infected computers from many locations) to attack
Prevent DOS (FARM)
- Firewalls and anti-DDoS protection
- Limit the number of requests per user (rate limiting)
- Monitor unusual traffic spikes
Define cryptography, encryption and explain encryption process
cryptography: process of hiding info so that only the person the msg is intended for can read
encryption: process of protecting the data by converting it into ciphertext that no one can read
Encryption process
1) theres a digital doc you want to send
2) the document is encrypted by the public key which will scramble or “lock” the document
3) the document is transferred thru the internet. anyone without the private key cannot access the document
4) only the person with the private key can decrypt by converting ciphertext into document again.
5) finally the digital document can be read