EoY (chapter 5: The internet and the WWW, Cyber Security) Flashcards
1
Q
what is the internet?
A
- word comes from INTERconnected NETwork
- it is baisically a collection of interconnected networks, hence its name
- it’s more of a concept than something tangible
- relies on physical infrastructure
2
Q
what is the WWW:
A
- WWW = world wide web
- it is JUST A PART OF THE INTERNET
- WWW = a collection of webpages
- it is accessed using web browser software
- based on hypertext transfer protocol (HTTP)
3
Q
compare WWW and the internet:
A
WWW:
1. collection of web pages
2. URLs are used to find locations of web pages
3. accessed by web browsers
4. uses the internet to access information
internet:
1. users can send and receive emails
2. allows online chatting
3. uses TCP and IP
4. worldwide collection of interconnected networks + devices
4
Q
name the types of cyber threats (8 total)
A
- brute force attacks
- data interception
- DDoS (denial of service ) attacks
- hacking
- malware (viruses, Trojan horse, spyware…etc)
- phishing
- pharming
- social engineering
5
Q
brute force attacks?
A
- systematically trying all combinations of letters, numbers, and characters to try to crack a password
- might use a list of common passwords
6
Q
data interception?
A
- stealing data by tapping into a wired or wireless communication link
- intercepted data is then sent back to the hacker
- can be carried out using packet sniffers and/or APM (access point mapping)
7
Q
DDoS attacks?
A
- DDoS = distributed denial of service
- large number of requests sent to a server at once
- designed to flood a server with useless traffic
- server will stop and try to deal with the traffic, preventing users from accessing the web server
- the website might crash, and spam will originate from many different computers from different locations
8
Q
hacking?
A
- hacking = illegally accessing a computer system
- people hack because of curiosity, military, financial gain, and for malicious reasons
9
Q
types of malware? (6 types)
A
- worms
- viruses
- ransomware
- trojan horse
- adware
- spyware
10
Q
worms?
A
- malware that self-replicates
- spreads throughout networks (relys on poor network security)
- they replicate without targeting specific files
- don’t need an active program or user to initiate them
11
Q
viruses
A
- program replicates itself
- deletes and/or corrupts files
12
Q
ransomware:
A
- encrypts data on a user’s computer
- the criminal locks the data until they receive the ransom (money), after which they send the key to unlock it
- it often infects as a Trojan horse
13
Q
Trojan horse:
A
- disguised as legitimate software but has malicious intentions
- often arrives as an email attachment
- it needs to be executed to run and infect
- once installed it can act as spyware or ransomware
14
Q
adware:
A
- floods the user with unwanted adverts
- usually in the form of pop-ups
- re-directing browsers to different websites
15
Q
spyware
A
- user clicks on a link from an email or website
- when clicked, spyware is downloaded
- monitors user’s activity and relays it back to the criminal
- keypresses can be analyzed to find passwords
- common key logs allow passwords to be found