Cyber security Flashcards
Cyber security
The practice of protecting systems, networks, and programs from digital attacks. These cyberattacks are usually aimed at accessing, changing, or destroying sensitive information; extorting money from users; or interrupting normal business processes.
Network security
The practise of protecting the usability and integrity of network and data. It includes both hardware and software technologies. Like firewalls and intrusion prevention systems. Effective network security manages access to a network. It targets a variety of threats and stops them from entering or spreading on a network.
Individuals who will violate computer security for malicious or financial reasons; they may also be known as crackers. they may also do it with good intentions, such as ethical hackers and penetration testers.
Hackers
Ethical hackers
Individuals whose activities are designed to test and enhance computer security; they may also be known as ethical hackers.
Hacktivists
Individuals who use technology to announce a social, ideological, religious, or political message.
Software designed to record and store every keystroke made on a computer. Criminals often attempt to install keylogging software onto a computer remotely. It can be used to record passwords and messages.
Key logging
Pharming
Pharming redirects victims to a bogus site even if the victim has typed the correct web address. This type of scam is often applied to the websites of banks or e-commerce sites.
Phishing
Phishing is the act of trying to obtain confidential records such as passwords. Emails that look as if they are from a legitimate, respected organisation are sent, but they contain links to fake websites that ‘phish’ data from unsuspecting victims.
Pretexting
Attackers focus on creating a good pretext, or a fabricated scenario, that they can use to try and steal their victims’ personal information. This type of attack commonly takes the form of a scammer who pretends that they need certain bits of information from their target in order to confirm their identity.
Baiting
Similarly to phishing attacks, the scammer promises items or goods to entice their victims.
Malware
Short for malicious software, this is programming or code that is used to disrupt computers by:
● Gathering sensitive information
● Gaining access to private computer systems
● Displaying unwanted advertising
● Distributing the performance of a computer or network
or holding data ransom
Trojan
A malicious computer program that tricks users into willingly running it is called a ‘Trojan horse’ or simply a ‘Trojan’. They can be delivered via internet downloads, infected USBs, or email attachments.
This type of attack can occur when an attacker systematically submits guessed passwords with the hope of eventually guessing correctly.
Brute force attack
DDoS
In a distributed denial of service attack (DDoS attack), the incoming traffic flooding the victim originates from many different sources. This makes it impossible to stop the attack simply by blocking a single source.
Virus
Malware that usually embeds itself into existing software on a device and then, once that software is run, spreads to other executable files.