cyber security Flashcards
what is a dos attack
makes a digital system unavailable to its user by flooding it with network traffic
what is adware and how is it used
it generates revenue from its author
it could include spyware
what is botnet and how is it used
attempts to take digital control of digital system
allows attackers to take control of a infected digital systems
what is ransomware and how is it used
holds a computer system captive and asks for money for it to be released
can restrict the user from access to their computer system
what is spyware and how is it used
it can collect data from a hacked device
usually hidden and hard to detect
what is Trojan horse and how is it used
a fake application which is malware in secret to take control of a hacked device
can be hidden in valid programs and can make copies of it self to teal information.
what is virus and how is it used
attempts to make a computer system unreliable
a computer program that replicates itself and spreads
what is worm and how is it used
a computer program that replicates itself to spread to other computers
can use network to spread almost always causes harm to network.
what is social engineering give 2 example
baiting/phishing
what is baiting and how is it used
trying to get victims to give cyber criminals information that they want
make a good promise to get the information that they need
what is phishing and how is it used
tries to get users to input their debit/credit details into a fake website
use fake websites most common targets are bank and insurance websites
what is pretexting and how is it used
cyber criminal lie to get data and information
usually involves a scam where the criminal pretends to need inform to confirm another persons identity
what is quid pro quo and how is it used
tries to disable anti-virus software so malware can be installed and gain accesss
similar to baiting/ telephone call claiming to be from a IT service provider
what is shoulder surfing and how is it used
aim to steal data and information
A persons private and confidentional information can be seen by the attacker stands close to see a pin for a chash machine
what is scare-ware and how is it used
scare people into downloading/buying useless software
malware usually pop-ups that attempt to convince users there is a virus or hacking attack