cyber security Flashcards
Hacking
illegally gaining access to a computer system
Cracking
illegally changing source code of a program so that it can be exploited for another use
6 types of malware
worms, viruses, ransomware, adware, trojan horse, and spyware
Spyware
software that gathers information by monitoring; the gathered info is sent back to the person who sent the software
Viruses
program(or program code) that self-replicate and delete/corrupt files, or causing the computer to malfunction
Phishing
a legitimate-looking email sent to a user by a cybercriminal; redirects user to fake website; used to try and steal financial details
Pharming
malicious code stored on a computer; redirects user to fake website to steal users data
Brute force attacks
a hacker systematically trying all combinations of letters, numbers and characters to ‘crack’ user’s password
DNS cache poisoning
used with pharming; changes the IP address sent by DNS server to fake website
Trojan horse
disguised as legitimate software but with malicious intentions; often arrive as an email attachment; need to be executed to run and infect
Trojan horse often act as ________ or _______ once installed.
spyware, ransomware
Adware
software that floods user with unwanted adverts; usually in the form of pop-ups; redirects user’s browser to different websites
Worms
malware that self-replicates; spread throughout networks - rely on poor network security
Unlike a virus, _______ don’t need an active open program to cause damage or user to initiate them
worms
Social engineering
Cybercriminal manipulates user to drop usual security procedures; no hacking involved