Chapter 5.5 Flashcards
What happens during the brute force attack?
Multiple guesser are made at your password in order to try and break into your computer or account
What is the aim of the Brute force attack?
to steal your precious personal data or use your account to buy products online
What are the security solutions that can be used for the brute force attack?
strong password
two factor authentication
biometric password
a limited number of attempts in entering a password
What happens during Data interception?
Data packets are intercepted and examined through the use of software such as a packet sniffer
What is the aim of Data interception?
to steal your precious personal data for a criminal activity such as identity theft and fraud
What are the security solutions that can be used for Data interception?
Encryption such as SSL protocol and visually checking the URL of a website to see if it uses the HTTP[S protocol
What is a packet sniffer?
a piece of software that is used to examine the contents in a packet of data
What happens during the DDoS attack?
Malware is sent to lots of computers to turn them into bots to create a botnet. The perpetrator then uses the botnet to send many requests to a web server all at the same time
What is the aim of the DDoS attack?
The aim is to cause the web server to crash. The perpetrator may be doing this to demand money for it to stop, or as an act of revenge or activism
What are the security solutions that can be used for the DDoS attack?
The company can use a proxy server to act as a barrier that filters requests to the web server. You can scan your computer with anti-malware on a regular basis to try and prevent it being used as a bot
What is a botnet?
What is a zombie?
it is a computer that had downloaded malware but it is not being currently used
How does a proxy server work?
It works by examining requests that are being sent by devices that want to access the web pages that are stored in a web server
What happens during Hacking?
a hacker gains unauthorized access to your data by exploiting a vulnerability in your computer or network
What is the aim of Hacking?
The aim is to steal, corrupt or leak your data for criminal activity