IT101 COMP SECURITY THREATS Flashcards
No —– = very vulnerable to virus infections
anti-virus software
No anti-virus software = very ——- to virus infections
vulnerable
*A technology term used when someone impersonates
*Ranges from using the name, identification card, SSS
number or any other personal information
*Get a document or credit in your behalf, without the
owner’s knowledge and permission
Identity Theft
Identity Theft
*A technology term used when someone ———-
*Ranges from using the —————- or any other personal information
*Get a document or credit in your behalf, without the
owner’s knowledge and permission
-impersonates
-name, identification card, SSS
number
*Watching someone who withdraws in an ATM machine
*Getting to know his/her PIN (Personal Identification
Number)
Shoulder Surfing
Snagging
*Also known as ———–
* The attacker can listen to your conversation on the
telephone as you give your personal information (credit
card number and other pertinent details)
Wire-tapping or Man-in-the-middle attack
*Also known as Wire-tapping or Man-in-the-middle attack
* The attacker can listen to your conversation on the
telephone as you give your personal information (credit
card number and other pertinent details)
Snagging
*Attacker goes to garbage cans or trash bins to get
cancelled checks, bank deposit slips, or credit card
statements
Dumpster Diving
- Most predominant sources of identity theft
- Theft tricks the unsuspecting victim into providing critical
information under the pretext of something legitimate
(pretending to be one who is in authority)
Social Engineering
Social Engineering
- Most ——– of identity theft
- Theft tricks the unsuspecting victim into providing critical
information under the pretext of something legitimate
(pretending to be one who is in authority)
predominant sources
- attacker recreates the website or support portal of a renowned
company and sends the link to targets via emails or social media
platforms - other person, completely unknown of the real attacker, ends up
compromising personal information and even credit card details
- Phishing
- assumed as a subset of Phishing since it requires an extra effort
from the side of the attackers - need to pay attention to the degree of uniqueness for the limited
number of users they target - the chances of users falling for the false emails are considerably
higher in the case of spear phishing
- Spear Phishing or Whaling Attack
- Old fashioned attack – using a phone
- recreate the IVR (Interactive Voice Response) system of a
company - attach it to a toll-free number and trick people into calling the
phone number and entering their details
- Vishing
- scripted scenario presented in front of the targets, used to
extract PII or some other information - seen various TV shows and movies where detectives use this
technique to get into places where they’re personally not
authorized, or extract information by tricking people
- Pretexting
- Attackers leave infected USB drives or optical disks at
public places with a hope of someone picking it up out of
curiosity and using it on their devices - Various download links, mostly containing malicious software,
are thrown in front of random people hoping someone would
click on them
Baiting
- a person takes help of an authorized person to get access to
restricted areas where RFID authentication or some other
electronic barrier is present
Tailgating
Tailgating
* Also known as ——
* a person takes help of an authorized person to get access to
restricted areas where RFID authentication or some other
electronic barrier is present
piggybacking
- involves people posing as technical support
- make random calls to a company’s employees claiming that
they’re contacting them regarding an issue - involves an exchange of something with the target, for instance,
the attacker trying to solve a victim’s genuine problem; in return,
they will as for a gift
Quid Pro Quo
- Program triggered to perform a task or mission when it
encounters some sequence of events or activities or after
a certain amount of time lapses or when a data come - Friday the 13th Virus and April Fool’s Day virus
Logic Bombs
Logic Bombs
- Program triggered to perform a task or mission when it
encounters some sequence of events or activities or after
a certain amount of time lapses or when a data come
Friday the 13th Virus and April Fool’s Day virus
*A small code that a Web server asks your web browsers
to place in the computer
* Contains pertinent information that identifies your
workstation’s IP address, login name, email address and
other information about the visited site
Cookies
Cookies
*A ——– that a Web server asks your web browsers
to place in the computer
* Contains pertinent information that identifies your
workstation’s IP address, login name, email address and
other information about the visited site
small code
*Offers products or services that usually the user don’t
need or want
*Almost tagged as commercial advertisements
*Defined as unsolicited email
Spam
Spam
*Offers products or services that usually the user don’t
need or want
*Almost tagged as commercial advertisements
*Defined as ——–
unsolicited email
- Fraudulent act
- Such as stealing account information from unsuspecting
customers, non-delivery of services and merchandise that
are ordered online, etc.
Cybercrime
Cybercrime
- Such as stealing account information from unsuspecting
customers, non-delivery of services and merchandise that
are ordered online, etc.
Fraudulent act
Cybercrime Types
- Cyber Extortion
- Cryptojacking
- Cyber Espionage
- Dark Web
Crime involving an attack or threat coupled with a demand for
money to stop the attack
Cyber Extortion
- attacks use scripts to mine cryptocurrencies within browsers
without the user’s consent - involve loading cryptocurrency mining software to the victim’s
system
Cryptojacking
- cybercriminal hacks into systems or networks to gain access to
confidential information held by a government or other
organization - gather, modify or destroy data, as well as using
network-connected devices, like webcams or closed-circuit TV
(CCTV) cameras, to spy on a targeted individual or groups and
monitoring communications, including email, text messages and
instant messages
Cyber Espionage
- Old crime as “exit scam”
- dark web administrators divert virtual currency held in
marketplace escrow accounts to their own accounts –
essentially, criminals stealing from other criminals
*Dark Web
*Dark Web
* Old crime as “———”
exit scam
*Illegal act of accessing the computer resources of some
people without their knowledge or permission
*Unauthorized access into company’s network system
*Hacker uses network or Internet connection to connect to
some other people’s computer to corrupt, change or
destroy data
Hacking
Tries to guess the password of the hapless victim
Sniffing
Hacker intercepts the data while it is transmitted or gain
access to the computer network system by posing as an
authorized user
IP Spoofing
Cybercrime Types
- Cyber Extortion
- Cryptojacking
- Cyber Espionage
*Dark Web
- Crime involving an attack or threat coupled with a demand for
money to stop the attack
- Cyber Extortion