Computer Science - Cyber Security Threats Flashcards
What does the social engineering technique do?
People are tricked or manipulated into giving away confidential information or access details. Techniques include blagging,phishing and shouldering
What does malicious code do?
Malicious programs are installed on a computer system. They cause damage and disrupt functionality or steal info. Types of malware include computer viruses, Trojans and spyware
What does pharming do?
Users of a website are redirected to a Fake version of the website. Login details are captured to enable the criminal to access the real account
What do weak and default passwords do?
Weak or default passwords are used to gain access to a network or computer
What does misconfigured access rights do?
Users are able to access emails and files belonging to another user.
What does removable media do?
Can be used to copy and steal data from a system. Can also introduce malware to a system
What does unpatched and/or outdated software do?
Can make a system vulnerable to hacking or being attacked by malware
What is penetration testing ?
Penetration testing tests a system or network in order to identify vulnerabilities in to security that an attacker could exploit
What are the 2 types of penetration testing.
Black and white box penetration testing
Explain what the 2 types of penetration testing are.
White box penetration is designed to stimulate a malicious insider who has knowledge of the target system and is likely to have basic credentials to gain access.
Black box penetration test is designed to stimulate an external hacking or cyber warfare attack, where the attacker has no knowledge of any usernames,passwords or other normal means of access for the target system
What are the 3 different types of social engineering?
Blagging,phishing and shouldering
What is blagging?
The criminal invents a scenario to engage a targeted victim. Victims are persuaded to divulge info or perform actions that would be unlikely in ordinary circumstances
What is phishing?
Fake emails, SMS messages or websites are used to trick people into giving away their persona data
What is shouldering?
Observing over the shoulder of a person as they enter details such as their password or PIN
What is malware?
Malware is a software that’s been written with the intention to cause damage and disrupt the functionality of a computer system or to steal data