Cybersecurity Flashcards
Malware
- Short for malicious software, malware is a
broad-spectrum term used to describe
software used to disrupt computer operation.
Viruses
- A virus is a computer program that is able to
copy itself onto other programs often with the
intention of maliciously damaging data. A virus
is transmitted by ‘piggybacking’ on another
program known as a ‘vector’.
Worm
Is similar to a virus but is a standalone
program that replicates itself in order to spread
to other computers. It does not need a vector.
Key loggers
Are covert programs that capture keyboard (or
other input device) input and transmit this data
to a third party or hold the data for collection.
firewall
software or hardware security system that controls the
incoming and outgoing network traffic. Packets of data are analysed to determine whether
they should be allowed through or not.
protection
patching out-dated software
* security tools
* personnel.
anti-virus software
program that can be loaded into
memory when the computer is running.
It monitors activity on a computer
system for the signs of virus infection
SQL injection
malicious users can inject SQL commands into an SQL
statement, via web page input. Injected SQL commands can alter SQL statements and
compromise the security of information held in a database.
Denial of service (DoS) attacks
attempt to make your website and servers unavailable to legitimate users, by swamping a
system with fake requests
(single internet connection)
DDoS
launched from multiple
connected devices that are distributed
across the internet.
Dictionary attack
This uses a simple file containing words found in a
dictionary. This attack uses exactly the kind of words that
many people use as their password
Brute force attack
able to detect
non-dictionary words by working through all possible
alphanumeric combinations from aaa1 to zzz10. It’s not
quick, but it will uncover your password eventually.
Guess
A user-generated password is unlikely to be random.
Passwords are likely to be based upon our interests,
hobbies, pet names, family names etc. Educated guesses
often work.
IP spoofing
an attacker changing
the IP address of a legitimate host so that a visitor who types in the URL of a legitimate site
is taken to a fraudulent or spoofed web page
Social engineering
tricking a user
into giving out sensitive information such as a password, by posing as a legitimate system
administrator.