Cyber Attacks and Cyber Crime Flashcards

1
Q

What is cyber security

A

body of

  • technologies
  • processes
  • practices

designed to protect

  • networks
  • computers
  • data
  • programs

from

  • attack
  • damage
  • unauthorized access
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the key cyber security topics/ branches

A
application
info
network
disaster recovery/business contuinity planning
end-user education
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is cyber crime

A

criminal activities
facilitated or committed by
use of computer or against a computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is cyberspace? What are the terms

A

global computer network
links people, machines,sources of info in the world
one can move and navigate as through virtual space

pervasive computing = Internet of things!
ubiquitous computing = always on, anytime anywhere
when there is money, the criminals come

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are the impact of cyber crime?

A

losses

  • money (some and lots)
  • time
  • reputation
  • privacy
  • secrets
  • war
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are the schemes of cyber attack

A

criminal attacks

  • scams (email scam, bogus auction)
  • fraud (eCommerce fraud)
  • extortion (ransomeware, scareware)
  • intellectual property attack (piracy, unauthorized copying from another site)
  • identity theft
  • brand theft
  • digital forgery (fake emails, fake university)

privacy violation

  • targeted (stalking, industrial espionage)
  • data harvesting (massive data collected without authorization —-> use coorelation —> derive behavioural information)
  • surveillance
  • traffic analysis (comm patterns)

publicity attacks: tarnish a person/org reputation

  • web defacement
  • DOS attack
  • slander mass emails
internet banking attack
wifi attack
APT (advanced persistent threat) attacks
Lost or stolen USB, notebooks, smart phones
spam
server breach 
espionage, wikileaks
ATM attack, power failure
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are the tools of cyber crime?

A

malware (crimeware)

  • worms
  • virus (logic bomb (timed virus)
  • trojan horse –> RAT
  • ransomware
SQL 
URL manipulation
Trojan (Spyeye)
spyware
spearphising
USB attack  
man in the middle 

disguise it as (game, porn, email, fake anti-virus software)

cold boot attack
USB
Gadgets pre installed with bugs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Why is malware so strong now?

A

anti-virus signature not working (freeware ones just as good)
- encryption
- zero day attack
- trick you to install
rapid creation of new malware
- built each day, designed for you (automated customization via Crimeware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is an USB attack?

A

USB/ dvd etc.
victim plug into computer
infection starts

how?

  • malicious content (bad pdf)
  • CDFS autostart (no longer)
  • exe renamed as image file
  • infected exectuable
  • web content that take you to malicious website
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is a virus

A

self replicating program

spreads by inserting copies of itself into other executable code or documents.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is a trojan horse. What is a RAT

A

computer program
leave infected computer open for hackers to gain access. (backdoor)

RAT: embedded in normal software (fool user it is benign)
hidden and insidious (tool to steal your information)
NOT A VIRUS (does not proliferate)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What can a RAT do

A

Manipulate stuff

  • download webcode
  • turn off anti virus
  • modify data
  • exploits known vulnerabilities

Steal info

  • allows other access –> drop more malware
  • steals info
  • keylogging
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are the eCommerce risks?

A

RISK TO VISITORS

Malicious/ false websites

  • steal visitor ID and passwords
  • credit card info
  • monitor visitor activity (man in the middle)
  • hard drive spying

internet vendors and ISP sell without authorisation

  • customer data
  • personal data (credit card, bank accounts, email add), underground economy servers
  • Data harvesting and behavioural tracking using cookies

RISK TO VENDORS

  • Customer impersonation (get product without paying, create negative publicity )
  • DOS
  • web defacement
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Where do Insider Risk come from

A

former employees who were fired or laid off
current employees: angry frustrated, want to dmg
mistake of employee
industrial espionage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Who are the bad guys/adversaries

A
hackers and crackers
lone criminals/ organised crime
terrorist
national intelligence agencies
military cyber units
information warriors
malicious insiders and disgruntled employees
industrial espionage
press (online/ offline)
pranksters
extortionist
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is a ransomware? How is it downloaded?

A

malware which holds computer system/ data
hostage against its user
demand ransom for restoration

files get encrypted/system will not boot corretly

17
Q

What are the motivations for cyber attacks?

A

money (ransomware)
political goals
for a cause