Cybersecurity Flashcards
What are the main threats to cybersecurity?
- Malware
- Viruses
- Worms
- Keyloggers
- Trojans
- Spyware
- Hacking
What does malware do and how do we prevent it?
A piece of software made to disrupt or damage a computer system.
Prevention- Install antivirus software on a file server to scan all files regularly for possible infection,
What does a virus do and how do we prevent it?
What is the difference between a worm and a virus?
A type of malware that is installed without the users knowledge (usually via email) and will repeatedly copy and embed itself in programs and data files to infect and corrupt them.
Worms work independently without human action where viruses need human assistance.
Prevention- Install an antivirus on email servers.
What does a key logger do and how do we prevent it?
A program that copies and stores all keystrokes for fraudulent access to passwords and confidential information.
Prevention- Using a Bluetooth keyboard that encrypts strokes and prevents the installation of device drivers.
What does a trojan do and how do we prevent it?
Software that breaches access by disguising itself as a harmless software and will access user’s data (e.g. banking details)
Prevention- Encrypt all sensitive data
What does spyware do and how do we prevent it?
Software that accesses and transmits data from another computer’s hard drive
Prevention- Using encryption keys that allow access only to authorised users and placing a firewall on servers to check/block network traffic.
What does hacking do and how do we prevent it?
When a user gains unauthorised access to a computer system.
Prevention- Set up firewalls on network servers and encrypt important data.
What are the 5 types of technical weaknesses?
SQL Injection DoS (Denial of Service) Attack IP Address spoofing Social Engineering Phishing
What is SQL injection?
When a hacker uses SQL (Structure Query Language) code to gain access to a data base and steal valuable information.
What is a DoS Attack?
When a network/ website is flooded with data traffic to bring it to a halt. (Usually asking for a ransom to boot the network/ website back up)
What is IP Address Spoofing?
When a hacker changes the IP address of a site so that visitors are taken to a fraudulent web page.
What is social Engineering?
When cyber criminals personally manipulate/trick employees into giving them access to a network by pretending to be a contact of their company
What is Phishing?
When an attacker uses emails or text messages to impersonate an organisation and trick employees into give them confidential data which allows them to access accounts/ networks.
What is the difference between foot printing, ethical hacking and penetration testing?
Foot printing
- When a penetration tester determines how much detail a potential hacker could find out ABOUT THE SYSTEM
- This allows an organisation to limit the technical information about a system that is publicly available
Ethical Hacking
- Is carried out with the permission of the system owner to cover all computer attack techniques
- They attempt to bypass system security and search for any weak points that could be exploited by a hacker.
- They know how to reinforce the security.
Penetration testing
- A broader penetration test carried out by the companies IT team
- It can be carried out automatically
- External (Hacker getting in) and Internal (Malicious employee) testing