Computer Misuse Flashcards

1
Q

Computer Virus

A

A piece of software attached to genuine files, designed to replicate itself and perform malicious actions.

e.g. Melissa

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Worm

A

A standalone piece of software that replicates and then executes itself, without needing a host file to work.

e.g. I Love You

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Backdoor

A

A malware allowing access to a particular system at a later time by leaving a ‘backdoor’, bypassing normal security measures.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Trojan Horse

A

A piece of software that looks like a genuine application, but includes a component that performs malicious actions such as keylogging or a backdoor.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Ransomware

A

A malware that encrypts files on a system, refusing to unlock them unless a sum is paid.

e.g. WannaCry, Rensenware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Phishing

A

A method used by hackers to trick victims into revealing sensitive information or performing a task.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Cyberwarfare

A

Hacking a nation state or international organisation, aiming to damage its computers, information networks and security systems.

e.g.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Hacktivism

A

Hacking for politically or socially motivated reasons.

e.g. Anonymous, LulzSec

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are the three “crimes” of the Computer Misuse Act?

A

Unauthorised access;

Ulterior intent;

Unauthorised modification.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

RIPA

A

An individual who is believed to have cryptographic keys may face up to two years in imprisonment for failing to hand them over.

e.g. of usage: Lucy McHugh case

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are black-hat, white-hat and grey-hat hackers?

Extra: Blue-hats, green-hats and red-hats?

A

Black-hat hackers try to break into systems with malicious intent.
White-hat hackers try to break systems with the intent of helping these systems strengthen themselves.
Grey-hat hackers move between both, but never use their skills for personal gain.

Honorable mentions: blue-hats (testers before release), green-hats (new hackers), red-hats (attack black-hats)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly