cyber security Flashcards

1
Q

what is a dos attack

A

makes a digital system unavailable to its user by flooding it with network traffic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

what is adware and how is it used

A

it generates revenue from its author

it could include spyware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

what is botnet and how is it used

A

attempts to take digital control of digital system

allows attackers to take control of a infected digital systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

what is ransomware and how is it used

A

holds a computer system captive and asks for money for it to be released

can restrict the user from access to their computer system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

what is spyware and how is it used

A

it can collect data from a hacked device

usually hidden and hard to detect

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

what is Trojan horse and how is it used

A

a fake application which is malware in secret to take control of a hacked device

can be hidden in valid programs and can make copies of it self to teal information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

what is virus and how is it used

A

attempts to make a computer system unreliable

a computer program that replicates itself and spreads

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

what is worm and how is it used

A

a computer program that replicates itself to spread to other computers

can use network to spread almost always causes harm to network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

what is social engineering give 2 example

A

baiting/phishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

what is baiting and how is it used

A

trying to get victims to give cyber criminals information that they want

make a good promise to get the information that they need

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

what is phishing and how is it used

A

tries to get users to input their debit/credit details into a fake website

use fake websites most common targets are bank and insurance websites

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

what is pretexting and how is it used

A

cyber criminal lie to get data and information

usually involves a scam where the criminal pretends to need inform to confirm another persons identity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

what is quid pro quo and how is it used

A

tries to disable anti-virus software so malware can be installed and gain accesss

similar to baiting/ telephone call claiming to be from a IT service provider

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

what is shoulder surfing and how is it used

A

aim to steal data and information

A persons private and confidentional information can be seen by the attacker stands close to see a pin for a chash machine

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

what is scare-ware and how is it used

A

scare people into downloading/buying useless software

malware usually pop-ups that attempt to convince users there is a virus or hacking attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

what is data manipulation

A

when data is edited

16
Q

what is data modification

A

changes data to meet the attackers needs

17
Q

what is denial of service to authorized other

A

while a website is under or after an attack has finished authorized users cant access the websites