Cyber Threats to Systems Security Flashcards
Forms of attack
- Networks have many access points to data(creating vulnerabilities)
- An attack is when data is viewed or vandalised without authorisation
- Attacks either passive (data is monitored) or active (data is modified)
E.G by wiretapping
E.G through malware - Can also be classified as attacks that are inside(Done by someone within the organisation) or outside(done by an illegitimate, external user)
Forms of Malware
Malware are hostile or intrusive software (Used in active attacks)
Viruses: Inset themselves in normal programs, so when the host program gets executed, so does the virus
Worms: Like viruses but spread autonomously. Due to them spreading so quickly, they can overload network
Trojans: Installed on a computer disguised as desirable software
Spyware: Collects data about activities on the computer, then sends it back to the attack instigator
E.G recording passwords entered
Adware: Automatically renders’ unwanted adverts to generate revenue
E.G Pop-ups that are uncloseable
What is Phishing?
Phishing= obtaining sensitive information by disguising the message and/or link as a trustworthy source. Can contain malware
This is an example of social engineering, which exploits the fact that people are often the weak points in systems by manipulating them
What is a Brute-force attack?
A brute-force attack is when a possible combinations are systematically tried, with the hope of eventually getting it right.
The longer the password, the harder this is (combinations grow exponentially) and can be made harder by adding more login steps (E.G entering memorable information too)
What is a DoS?
A Denial-of-service attack(DoS) is when a network resource becomes deliberately overloaded (“Flooded”) with unnecessary requests, preventing it from responding normally
In a distributed attack (DDoS), the requests come from many sources, so you can’t just block a single IP address
What is a SQL Injection?
When a website is linked to a database and allows the user to enter information, it is vulnerable to SQL injection
SQL is used to interact with the database via statements
E.G: SELECT * FROM Students WHERE Name = userInput: