Computer Misuse Flashcards

1
Q

What is hacking era 1

A

The joy of programming, enjoys the detail and stretching their capabilities, as opposed to most users who prefer to learn only the minimum

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is hacking era 2

A

The rise of hackings dark side

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is hacking era 3

A

hacking as a destructive criminal tool, a computer expert whobreaks into computer systems and/or accesses data which would otherwise be unavailable to them

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are the different levels of skills for hackers

A

Master
Journeyman
Apprentice

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Define an apprentice

A
  • They have a basic understanding of how to use attack toolkits.
  • They are responsible for the highest volume of attacks, but their attacks are the easiest to defend against.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Define a journeyman

A

They have the ability to modify attack toolkits. * These attacks are more targeted and are harder to defend against.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Define a master

A

They have the ability to create new attack toolkits. * Their attacks are hard to defend against and are often zero-day vulnerabilities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are the hacker types

A

white hat
Black hat
gray hat

New
blue hat
red hat
green hat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Define a black hat hacker

A

people who try to break into systems and/or networds to exploit them for malicious reasons

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Define a gray hat hacker

A

are between black hat and white-hat definition. They move between the two, but they don’t use their skill for personal gain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Define white hat hackers

A

they are ethical hackers who find vulnerabilities in systems to help strengthen the security of these systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Define blue hat hackers

A

to test to systems to see levels of security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Define red hat hackers

A

those that fight against black hat hackers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Define green hat hackers

A

new-comers, those at apprentice levels

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is an interruption attack

A

a hacker disrupts the service being provided and is degraded or unavailable to authorised users

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is an interuption attack

A

often called Denial of Serivce, Dos, an attempt to make a computer resource unavaliable

17
Q

What are some example of interruption attack

A

e.g. DOS - overloading server, vandilising, redirectiing requests to invalid destinations
theft

18
Q

What is an interception attack

A

In an interception attack, an unauthorized individual gains access to confidential or private information.
interception attacks are attacks against network confidentiality.

Performed by snooping on network traffic to try to obtain data such as passwords, credit card numbers or other types of sensitive information that may be transmitted in clear text.

19
Q

What are examples of interception attacks

A

○ Eavesdropping on communication.
○ Wiretapping telecommunications networks.
○ copying of files or programs.
○ Obtaining copies of messages for later replay

20
Q

What is a modification attack

A

where an unauthorised individual not only gains access to, but tampers with information, resources, or services

21
Q

What are examples of modification attack

A

○ Modifying the contents of messages in the network.
○ Changing information stored in data files.
○ Altering programs so they perform differently.
○ Reconfiguring system hardware or network topologies.
○ Also called “man in the middle” attacks.

22
Q

What is a fabrication attack

A

This is where an individual inserts counterfeit information, resources, or services into the network. Fabrication attacks are attacks against the authentication access control, and authorisation capabilities of the network.

23
Q

What forms do fabrication attacks come in

A

○ Inserting messages into the network using the identity of another individual.
○ Replaying previously intercepted messages.
○ Spoofing a web site or other network service.
○ Taking the address of another host or service, essentially becoming that host or service.
○ Also called “masquerading” attacks.

24
Q

Define a computer virus

A

a piece of software attached to genuine files (i.e., host file), designed to replicate itself and perform malicious actions (e.g., delete files) when activated.

25
Q

Define a computer worm

A

A computer worm is a standalone piece of software that performs malicious actions and can replicate itself, without the need of a host file to work.

26
Q

Define a backdoor

A

A backdoor is a malware that allows access to a particular system at a future time by bypassing normal layers of security measures.

27
Q

Define a Trojan horse

A

is a program that looks like a genuine application but includes a component that performs malicious actions (e.g., sending spam, installing a virus, creating a backdoor)

28
Q

Define randsomware

A

a malware that encrypts files on a computer and then displays a message demanding payment for the key to decrypt the files.

29
Q

What is social engineering

A

is the manipulation of people releasing sensitive information or performing a task that often weakens security measured

30
Q

What is phishing

A

is a type of fraud that an attacker sends a message to trick a victim into revealing sensitive information or performing a task.

31
Q

What is hacktivism

A

hacking for politically or socially motivated purpose

32
Q

What is cyberwarfare

A

involves hacking a nation-state or international organisation aiming to damage its computers, information networks and other vital systems

33
Q

What are the 3 main features of the Computer Misue Act

A
  1. Unauthorised access
  2. Ulterior intent
  3. Unauthorised modification
34
Q

What is the Regulation of Investigatory Powers Act 2000

A

An individual believed to have cryptographic keys may face up to two years imprisonment for refusing to hand them over to the police.