Essays, Descriptions Etc. Flashcards

1
Q

Describe an example a cyber attack.

A

Model: “In December of 2013, Target, was attacked by cybercriminals. The company revealed that 40 million customer records had been stolen. In this instance, the attackers used a technique called “spear phishing”: they send a spam email to Target’s air conditioning company, and after the virus had downloaded itself, it moved discreetly into the Target network, and was then used to steal many user accounts.”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Describe a Worm attack:

A
  1. The worm probes the computer to find a vulnerability.
  2. The worm exploits this vulnerability to gain access to the target computer.
  3. The worm downloads itself into the target computer, and store itself there.
  4. The worm then returns to the start and attacks another computer.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Describe the use of TCP:

A

TCP ensures datagrams are reliably sent and different types of data can be accessed simultaneously. It allows the receiving computer to tell which port (and which application) to send the datagram to. It also waits for confirmation of the arrival of datagrams, and can resend damaged ones. Because of this, it is relatively slow.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly