Chapter 5.5 Flashcards

1
Q

What happens during the brute force attack?

A

Multiple guesser are made at your password in order to try and break into your computer or account

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the aim of the Brute force attack?

A

to steal your precious personal data or use your account to buy products online

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are the security solutions that can be used for the brute force attack?

A

strong password
two factor authentication
biometric password
a limited number of attempts in entering a password

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What happens during Data interception?

A

Data packets are intercepted and examined through the use of software such as a packet sniffer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is the aim of Data interception?

A

to steal your precious personal data for a criminal activity such as identity theft and fraud

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are the security solutions that can be used for Data interception?

A

Encryption such as SSL protocol and visually checking the URL of a website to see if it uses the HTTP[S protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is a packet sniffer?

A

a piece of software that is used to examine the contents in a packet of data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What happens during the DDoS attack?

A

Malware is sent to lots of computers to turn them into bots to create a botnet. The perpetrator then uses the botnet to send many requests to a web server all at the same time

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is the aim of the DDoS attack?

A

The aim is to cause the web server to crash. The perpetrator may be doing this to demand money for it to stop, or as an act of revenge or activism

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are the security solutions that can be used for the DDoS attack?

A

The company can use a proxy server to act as a barrier that filters requests to the web server. You can scan your computer with anti-malware on a regular basis to try and prevent it being used as a bot

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is a botnet?

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is a zombie?

A

it is a computer that had downloaded malware but it is not being currently used

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

How does a proxy server work?

A

It works by examining requests that are being sent by devices that want to access the web pages that are stored in a web server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What happens during Hacking?

A

a hacker gains unauthorized access to your data by exploiting a vulnerability in your computer or network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is the aim of Hacking?

A

The aim is to steal, corrupt or leak your data for criminal activity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are the security solutions that can be used for Hacking?

A

A firewall,
automatic software updates
strong or biometric password
two step verification

17
Q

What are the 6 types of malware?

A

Virus
Worm
Trojan
Spyware
Adware
Ransomware

18
Q

What happens during a Malware attack?

A

malicious software is downloaded onto your computer or network

19
Q

What is the aim of a Malware attack?

A

malicious software is used to corrupt your data, gain access to your data or damage your hardware

20
Q

What are the security solutions that can be used for a Malware attack?

A

anti-malware software which includes:
anti-virus
anti-spyware
firewall
being cautious when downloading data
creating a backup

21
Q

What is a access level

A

the amount of direct access a user is given to data and resources. This could be set to only certain section of data and resources

21
Q

What happens during Pharming?

A

malicious software is downloaded onto your hard drive that will redirect you to a fake web page when you input the genuine URL

22
Q

What is the aim of Pharming?

A

To get your personal data to commit criminal activities such as stealing your money, identity theft or fraud

22
Q

What are the security solutions that can be used for Pharming?

A

anti-malware software visually checking the web pages and only downloading from trusted sources

23
Q

What is the aim of Phishing?

A

To get your personal data

23
Q

What happens during Phishing?

A

The perpetrator will send a fake email that is designed to look genuine . it will encourage he user to provide their personal data wither by clicking a link to a fake website or responding to their email

24
Q

What are the security solutions that can be used for Phishing?

A

checking if its the correct URL
If the website looks normal …

25
Q

What are the security solutions that can be used for Social Engineering?

A

Access level and awareness of how social engineering is conducted

26
Q

What is the aim of Social Engineering?

A

to get data to commit criminal activity such as stealing your money, hacking into your computer network and identity theft or fraud

26
Q

What happens during Social Engineering?

A

a perpetrator will try and manipulate and deceive you into providing them personal or confidential data