Cyber Threats to Systems Security Flashcards

You may prefer our related Brainscape-certified flashcards:
1
Q

Forms of attack

A
  • Networks have many access points to data(creating vulnerabilities)
  • An attack is when data is viewed or vandalised without authorisation
  • Attacks either passive (data is monitored) or active (data is modified)
    E.G by wiretapping
    E.G through malware
  • Can also be classified as attacks that are inside(Done by someone within the organisation) or outside(done by an illegitimate, external user)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Forms of Malware

A

Malware are hostile or intrusive software (Used in active attacks)

Viruses: Inset themselves in normal programs, so when the host program gets executed, so does the virus

Worms: Like viruses but spread autonomously. Due to them spreading so quickly, they can overload network

Trojans: Installed on a computer disguised as desirable software

Spyware: Collects data about activities on the computer, then sends it back to the attack instigator
E.G recording passwords entered

Adware: Automatically renders’ unwanted adverts to generate revenue
E.G Pop-ups that are uncloseable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is Phishing?

A

Phishing= obtaining sensitive information by disguising the message and/or link as a trustworthy source. Can contain malware

This is an example of social engineering, which exploits the fact that people are often the weak points in systems by manipulating them

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is a Brute-force attack?

A

A brute-force attack is when a possible combinations are systematically tried, with the hope of eventually getting it right.

The longer the password, the harder this is (combinations grow exponentially) and can be made harder by adding more login steps (E.G entering memorable information too)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is a DoS?

A

A Denial-of-service attack(DoS) is when a network resource becomes deliberately overloaded (“Flooded”) with unnecessary requests, preventing it from responding normally

In a distributed attack (DDoS), the requests come from many sources, so you can’t just block a single IP address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is a SQL Injection?

A

When a website is linked to a database and allows the user to enter information, it is vulnerable to SQL injection

SQL is used to interact with the database via statements
E.G: SELECT * FROM Students WHERE Name = userInput:

How well did you know this?
1
Not at all
2
3
4
5
Perfectly