EoY (chapter 5: The internet and the WWW, Cyber Security) Flashcards

1
Q

what is the internet?

A
  • word comes from INTERconnected NETwork
  • it is baisically a collection of interconnected networks, hence its name
  • it’s more of a concept than something tangible
  • relies on physical infrastructure
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

what is the WWW:

A
  • WWW = world wide web
  • it is JUST A PART OF THE INTERNET
  • WWW = a collection of webpages
  • it is accessed using web browser software
  • based on hypertext transfer protocol (HTTP)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

compare WWW and the internet:

A

WWW:
1. collection of web pages
2. URLs are used to find locations of web pages
3. accessed by web browsers
4. uses the internet to access information

internet:
1. users can send and receive emails
2. allows online chatting
3. uses TCP and IP
4. worldwide collection of interconnected networks + devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

name the types of cyber threats (8 total)

A
  • brute force attacks
  • data interception
  • DDoS (denial of service ) attacks
  • hacking
  • malware (viruses, Trojan horse, spyware…etc)
  • phishing
  • pharming
  • social engineering
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

brute force attacks?

A
  • systematically trying all combinations of letters, numbers, and characters to try to crack a password
  • might use a list of common passwords
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

data interception?

A
  • stealing data by tapping into a wired or wireless communication link
  • intercepted data is then sent back to the hacker
  • can be carried out using packet sniffers and/or APM (access point mapping)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

DDoS attacks?

A
  • DDoS = distributed denial of service
  • large number of requests sent to a server at once
  • designed to flood a server with useless traffic
  • server will stop and try to deal with the traffic, preventing users from accessing the web server
  • the website might crash, and spam will originate from many different computers from different locations
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

hacking?

A
  • hacking = illegally accessing a computer system
  • people hack because of curiosity, military, financial gain, and for malicious reasons
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

types of malware? (6 types)

A
  1. worms
  2. viruses
  3. ransomware
  4. trojan horse
  5. adware
  6. spyware
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

worms?

A
  • malware that self-replicates
  • spreads throughout networks (relys on poor network security)
  • they replicate without targeting specific files
  • don’t need an active program or user to initiate them
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

viruses

A
  • program replicates itself
  • deletes and/or corrupts files
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

ransomware:

A
  • encrypts data on a user’s computer
  • the criminal locks the data until they receive the ransom (money), after which they send the key to unlock it
  • it often infects as a Trojan horse
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Trojan horse:

A
  • disguised as legitimate software but has malicious intentions
  • often arrives as an email attachment
  • it needs to be executed to run and infect
  • once installed it can act as spyware or ransomware
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

adware:

A
  • floods the user with unwanted adverts
  • usually in the form of pop-ups
  • re-directing browsers to different websites
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

spyware

A
  • user clicks on a link from an email or website
  • when clicked, spyware is downloaded
  • monitors user’s activity and relays it back to the criminal
  • keypresses can be analyzed to find passwords
  • common key logs allow passwords to be found
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

phishing?

A
  • legitimate-looking fake email sent
  • user clicks on the link in the email, and then is re-directed to a fake website
  • often used to try and steal financial details
  • can be avoided by not clicking on links from unknown emails
17
Q

pharming?

A
  • malicious code stored on a computer
  • re-directs user to fake website to steal data
  • can be avoided by checking the URL
18
Q

social engineering?

A
  • no hacking is involved
  • cybercriminal tries to manipulate the user to drop usual security procedures (sob-story, etc..)
  • main types: instant messaging, scareware/pop-up, phishing, baiting, phone calls