cyber security Flashcards
brute force attacks
- a ‘trial and error’ method used by cybercriminals to crack passwords by finding all possible combinations of letters, numbers and symbols until the password is found
- logical steps:
- common passwords (12345, 11111)
- word list: a text file containing a collection of words used in a brute force attack
data interception
- an attempt to eavesdrop on a wired or
wireless network transmission - compromise privacy or to obtain
confidential information. - is carried out by a packet sniffer
packet sniffing
- data interception: wired networks
- a method used by a cybercriminal to
examine data packets being sent over a network and to find the contents of a data packet, which are sent back to the cybercriminal
wardriving
- also called access point mapping
- using a laptop, antenna, GPS device and
software to intercept Wi-Fi signals and illegally obtain data
methods of preventing data interception
– wired equivalency privacy (WEP) encryption protocol
security: an algorithm for wireless networks to protect
them against data interception
- use complex passwords
- do not connect to random public wireless network (wifi)
Denial of Service (DoS) attacks
- a cyberattack in which
cybercriminals seek to disrupt the normal operation of a website by flooding it with requests; - flood the network with useless spam traffic.
- when a user enters a website’s URL in their browser, a request is sent to the web server that contains the website or web page, since can only handle a number of requests, it becomes overloaded by an attacker
sending out thousands of requests, it won’t be able to service a user’s legitimate
request. - prevents users from:
1. accessing their emails
2. accessing websites/web pages
3. accessing online services (such as banking).
spam
unsolicited emails sent to a user’s mailbox
Distributed Denial of Service (DDoS) attacks
- distributed denial of service (DDoS) attack – a denial of service (DoS) attack in which the fake requests come from many different computers, which makes it harder to stop
methods of preventing Dos and DDos
- using an up-to-date malware checker
- setting up a firewall to restrict traffic to and from the web server or user’s computer
- applying email filters to filter out unwanted traffic (for example, spam).
signs of Dos and DDos
- slow network performance (opening files or accessing certain websites)
- inability to access certain websites
- large amounts of spam email reaching the user’s email account.
hacking
- the act of gaining illegal access to a computer
system without the owner’s permission - can lead to identity theft or the gaining of
personal information; data can be deleted, passed on, changed or corrupted.
methods of preventing hacking
- use of firewalls,
- user names
- frequently changed strong passwords.
- anti-hacking software
- intrusion-detection software also exists in the fight against hacking.
ethical hacking
- when companies authorise paid hackers to check
out their security measures and test how robust their computer systems are to hacking attacks.
malware
– programs (such as viruses, worms and Trojan
horses) installed on a user’s computer with the aim of
deleting, corrupting or manipulating data illegally
virus
- a program or program code that replicates itself
with the intention of deleting or corrupting files or by
causing the computer system to malfunction - needs an active host
- often sent as email attachments