Chapter 5.5 Flashcards
(30 cards)
What happens during the brute force attack?
Multiple guesser are made at your password in order to try and break into your computer or account
What is the aim of the Brute force attack?
to steal your precious personal data or use your account to buy products online
What are the security solutions that can be used for the brute force attack?
strong password
two factor authentication
biometric password
a limited number of attempts in entering a password
What happens during Data interception?
Data packets are intercepted and examined through the use of software such as a packet sniffer
What is the aim of Data interception?
to steal your precious personal data for a criminal activity such as identity theft and fraud
What are the security solutions that can be used for Data interception?
Encryption such as SSL protocol and visually checking the URL of a website to see if it uses the HTTP[S protocol
What is a packet sniffer?
a piece of software that is used to examine the contents in a packet of data
What happens during the DDoS attack?
Malware is sent to lots of computers to turn them into bots to create a botnet. The perpetrator then uses the botnet to send many requests to a web server all at the same time
What is the aim of the DDoS attack?
The aim is to cause the web server to crash. The perpetrator may be doing this to demand money for it to stop, or as an act of revenge or activism
What are the security solutions that can be used for the DDoS attack?
The company can use a proxy server to act as a barrier that filters requests to the web server. You can scan your computer with anti-malware on a regular basis to try and prevent it being used as a bot
What is a botnet?
A botnet (short for “robot network”) is a network of infected computers (bots) controlled remotely by a hacker
What is a zombie?
it is a computer that had downloaded malware but it is not being currently used
How does a proxy server work?
It works by examining requests that are being sent by devices that want to access the web pages that are stored in a web server
What happens during Hacking?
a hacker gains unauthorized access to your data by exploiting a vulnerability in your computer or network
What is the aim of Hacking?
The aim is to steal, corrupt or leak your data for criminal activity
What are the security solutions that can be used for Hacking?
A firewall,
automatic software updates
strong or biometric password
two step verification
What are the 6 types of malware?
Virus
Worm
Trojan
Spyware
Adware
Ransomware
What happens during a Malware attack?
malicious software is downloaded onto your computer or network
What is the aim of a Malware attack?
malicious software is used to corrupt your data, gain access to your data or damage your hardware
What are the security solutions that can be used for a Malware attack?
anti-malware software which includes:
anti-virus
anti-spyware
firewall
being cautious when downloading data
creating a backup
What is a access level
the amount of direct access a user is given to data and resources. This could be set to only certain section of data and resources
What happens during Pharming?
malicious software is downloaded onto your hard drive that will redirect you to a fake web page when you input the genuine URL
What is the aim of Pharming?
To get your personal data to commit criminal activities such as stealing your money, identity theft or fraud
What are the security solutions that can be used for Pharming?
anti-malware software visually checking the web pages and only downloading from trusted sources