cyber security Flashcards
Hacking
illegally gaining access to a computer system
Cracking
illegally changing source code of a program so that it can be exploited for another use
6 types of malware
worms, viruses, ransomware, adware, trojan horse, and spyware
Spyware
software that gathers information by monitoring; the gathered info is sent back to the person who sent the software
Viruses
program(or program code) that self-replicate and delete/corrupt files, or causing the computer to malfunction
Phishing
a legitimate-looking email sent to a user by a cybercriminal; redirects user to fake website; used to try and steal financial details
Pharming
malicious code stored on a computer; redirects user to fake website to steal users data
Brute force attacks
a hacker systematically trying all combinations of letters, numbers and characters to ‘crack’ user’s password
DNS cache poisoning
used with pharming; changes the IP address sent by DNS server to fake website
Trojan horse
disguised as legitimate software but with malicious intentions; often arrive as an email attachment; need to be executed to run and infect
Trojan horse often act as ________ or _______ once installed.
spyware, ransomware
Adware
software that floods user with unwanted adverts; usually in the form of pop-ups; redirects user’s browser to different websites
Worms
malware that self-replicates; spread throughout networks - rely on poor network security
Unlike a virus, _______ don’t need an active open program to cause damage or user to initiate them
worms
Social engineering
Cybercriminal manipulates user to drop usual security procedures; no hacking involved
5 main types of social engineering
instant messaging; scareware(pop up claiming user infected); phishing; baiting(cybercriminal leaves an infecting USB stick); phone calls(fake IT call center)
DDoS Attacks stand for
Distributed Denial of Service Attacks
DDoS Attacks
designed to flood a server with useless traffic(large number of requests); server come to a stop trying to deal with the traffic; spam originates from many different computers in different locations
_________ prevent users gaining access to the web server.
DDoS Attacks
Data Interception
Stealing data by tapping into wired/wireless comm link; intercepted data sent back to the hacker
Data interception can be carried out using _____________ and ____________________.
packet sniffer, wardriving/access point mapping
Causes of data loss
accidental deletion; malicious virus; hardware/software failure; natural disaster
Prevention of data loss
set data to read only; use correct shut down procedures/procedures when removing portable storage devices
Antivirus
compares virus signature against a database of known virus signatures
Firewalls
prevent unauthorized access; acts as a FILTER for incoming/outgoing data; checks data meets criteria; logs incoming and outgoing traffic; blocks access to specified IP addresses
Proxy server
keeps user IP address secret; prevents direct access to a web server; filters traffic; blocks selected IP addresses
Proxy server speeds up traffic using ________.
cache
Proxy server helps prevent hacking of a _________.
web server