Computers 💻 | Cyber S̸̈ẻ̸c̴̒ǘ̶̫r̷̋i̵̗̔ţ̸̍y̴̝̅| 5.2 Flashcards
List some examples of cyber security threats.
- Brute-force attack
- Data interception
- Distributed denial of service (DDoS) attack
- Hacking
- Malware (virus, worm, Trojan horse, spyware,
adware, ransomware) - Pharming
- Phishing
- Social engineering
Define brute-force attack
A ‘trial and error’ method used by cybercriminals to crasck passwords by finding every possible combination of letters, numbers, and symbols until the password is found
Describe how a brute force attack tries to crack a password in a reduced number of attempts
- Start by cheecking if the password is one of the most common ones used
- If not, start with a strong word list
Define word list
A text file containing a collection of words used in a brute force attack
Define data interception
An attempt to eavesdrop on a wired or wireless network transmission
Define packet sniffer
A method used by a cybercriminal to examine data packets being sent over a network and to find the contents of a data packet, which are sent back to the cybercriminal
Define wardriving
Using a laptop, antenna, GPS device and software to intercept Wi-Fi signals and illegally obtain data
Name two methods of data interception
- Packet sniffing
- Wardriving
Define Wired Equivalency Privacy
(WEP)
An algorithm for wireless networks to protect them against data interception
What are some ways to prevent data interception?
- Encryption
- Using WEP encryption protocol
- Using a firewall
- Using complex passwords for routers
- Not using public Wi-Fi due to no data encryption
Define Denial of Service
(DOS)
A cyberattack in which crybercriminals seek to disrupt the normal operation of a website by flooding it with requests
What is the purpose of DOS?
To prevent users from accessing part of a network
What does DoS commonly try to prevent users from accessing?
- Emails
- Websites/webpages
- Online services such as banking
How does a DoS attack prevent a website from operating?
The server can only handle a finite number of requests. So if it becomes overloaded by an attacker sending out thousands of requests, it cannot service a user’s legitimate request
What does DDoS stand for?
Distributed Denial of Service
How does a DDoS differ from a DoS?
In a DDoS attack, the spam traffic originates from many computers, making it difficult to block the traffic
How does a DoS attack target emails?
- An attacker sends many spam emails to an email account
- As ISPs only allow a specific data quota for each user, it clogs up the account
- The user cannot recieve legitimate emails
In what ways can a website or user guard against a DoS attack?
- Use an upto date malware checker
- Set up a firewall to restrict traffic to and from the web server or user’s computer
- Apply email filters to filter out unwanted traffic such as spam
What signs may signify a DoS attack?
- Slow network performance
- Inability to access certain websites
- Large amounts of spam emails reaching user’s email account
Define hacking
The act of gaining illegal access to a computer system without the owner’s permission
Why can’t encryption prevent hacking?
It makes the data meaningless to the hacker but it doesn’t stop them from deleting, corrupting, or passing on the data
How can hacking be prevented?
- Firewalls
- Anti-hacking software / intrusion detection
- Frequently changed strong password
Define ethical hacking
When companies authorise paid hackers to check out their seurity measures and test how tobust their computer systems are to hacking attacks
Define malware
Programs installed on a user’s computer with the aim of deleting, corrupting, or manipulating data illegally
List the types of malware.
- Viruses
- Worms
- Trojan horse
- Spyware
- Adware
- Ransomware
Define virus
A program or progam code that replicates itself with the intention of deleting or corrupting files, or by causing the system to malfunction
Define active host
Functioning software that a virus can affect by attatching itself to the code or by altering the code to allow the virus to carry out its attack
What are some ways in which a virus can cause a computer to malfunction?
- Corrupting important files
- Deleting .exe files
- Filling up the hard drive with ‘useless’ data
How can viruses be avoided?
- Don’t open emails from unknown sources
- Don’t install non-original software
- Don’t download unknown email attatchments
- Always run an up-to-data virus scanner
Define worm
A standalone type of malware that can self-replicate.
How do worms differ from viruses?
Unlike viruses, worms don’t need an active host; they can spread throughout a network without the need for any action by an end-user
How do worms spread?
They remain inside applications allowing them to move thoughout networks. Rather than targeting specific files, they rely on security failures in networks
How do worms frequently arrive to users?
As messager or email attatchement: one email opened may infect the whole network
Define Trojan Horse
A type of malware that is designed to look like legitimate software but contains malicious code that can cause damage to a computer system