Issues And Impact Flashcards
What are three things malware can be used for
To disrupt the normal function of a computer system
To spy on a user’s actions without their knowledge
To gain unauthorised access to a network or computer system
Viruses: what they do and how they spread
Viruses can slow down a computer, delete and damage data. They’re installed into a host file and attach themselves to other programs once opened.
Worm: What they do and how they spread
Worms slow down the function of a device. They self replicate and are able to spread around networks and through emails by attaching themselves.
Trojans: how they work and how they get onto a device
Trojans can deliver ransomware and encrypt files. They can also harvest / delete data and provide backdoor access to other computers on a network.
They are disguised as legitimate software and are installed along with it.
Spyware: how they are installed (software ones) and what they do
Often installed by a virus. Keyloggers records your keystrokes and uses this information to find your passwords. Sent back to hacker.
Some spyware can take control of your webcam without your knowledge.
Ransomware: what it does and how its installed / initialised / whatever
Often a trojan is used to distribute ransomware which encrypts your files.
The attacker demands a payment using difficult to trace methods like bitcoin for your files to be returned.
Sometimes they will leak files if you don’t pay, and sometimes they don’t even return the files.
Pretexting
The attacker pretends to be from a legitimate company, and creates a sense of panic in the victim.
They try to get usernames, passwords, bank details and other sensitive information.
Baiting (u have won!!!!!!)
Victims are offered a free giveaway such as a free game.
When downloaded malware is installed along with it.
Phishing
Victims receive an email with a link, leading to a realistic login page.
They’re tricked into entering their details (bank details, passwords) and their information is stolen.
Quid pro quo (yt vids)
Victims allow access to their computer for a service, such as a slow computer.
The hacker gains control of the device which gives an opportunity to install malware.
Ways of protecting devices from these attacks (3)
Acceptable use policy, restricting what users are allowed to do / install / not click links from unknown source
User access levels so if access is gains, the hacker is restricted in what they can uncover and steal.
Encryption. If the data is accessed without permission it will be unreadable and provide no value.
Two things that make a computer more vulnerable to attacks (not people)
Unpatched software - malware often exploits weaknesses in software to enter a computer system. Companies regularly update it to prevent this.
Out of date anti malware- signature based anti malware needs to be constantly updated because new malware is constantly being created.
Another way - specifically against ransomware and viruses
External backups. If the data is stolen, deleted or corrupted, it can be restored.
Symmetric vs asymmetric encryption
Symmetric - same key for encrypt and decrypt
Asymmetric - different, more private key to decrypt
One disadvantage of incremental backup, why
Takes longer to restore because you have to first restore the full backup, then every incremental backup one at a time.