IT101 COMP SECURITY THREATS Flashcards

1
Q

No —– = very vulnerable to virus infections

A

anti-virus software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

No anti-virus software = very ——- to virus infections

A

vulnerable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

*A technology term used when someone impersonates
*Ranges from using the name, identification card, SSS
number or any other personal information
*Get a document or credit in your behalf, without the
owner’s knowledge and permission

A

Identity Theft

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Identity Theft

*A technology term used when someone ———-
*Ranges from using the —————- or any other personal information
*Get a document or credit in your behalf, without the
owner’s knowledge and permission

A

-impersonates
-name, identification card, SSS
number

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

*Watching someone who withdraws in an ATM machine
*Getting to know his/her PIN (Personal Identification
Number)

A

Shoulder Surfing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Snagging

*Also known as ———–
* The attacker can listen to your conversation on the
telephone as you give your personal information (credit
card number and other pertinent details)

A

Wire-tapping or Man-in-the-middle attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

*Also known as Wire-tapping or Man-in-the-middle attack
* The attacker can listen to your conversation on the
telephone as you give your personal information (credit
card number and other pertinent details)

A

Snagging

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

*Attacker goes to garbage cans or trash bins to get
cancelled checks, bank deposit slips, or credit card
statements

A

Dumpster Diving

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q
  • Most predominant sources of identity theft
  • Theft tricks the unsuspecting victim into providing critical
    information under the pretext of something legitimate
    (pretending to be one who is in authority)
A

Social Engineering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Social Engineering

  • Most ——– of identity theft
  • Theft tricks the unsuspecting victim into providing critical
    information under the pretext of something legitimate
    (pretending to be one who is in authority)
A

predominant sources

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q
  • attacker recreates the website or support portal of a renowned
    company and sends the link to targets via emails or social media
    platforms
  • other person, completely unknown of the real attacker, ends up
    compromising personal information and even credit card details
A
  • Phishing
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q
  • assumed as a subset of Phishing since it requires an extra effort
    from the side of the attackers
  • need to pay attention to the degree of uniqueness for the limited
    number of users they target
  • the chances of users falling for the false emails are considerably
    higher in the case of spear phishing
A
  • Spear Phishing or Whaling Attack
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q
  • Old fashioned attack – using a phone
  • recreate the IVR (Interactive Voice Response) system of a
    company
  • attach it to a toll-free number and trick people into calling the
    phone number and entering their details
A
  • Vishing
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q
  • scripted scenario presented in front of the targets, used to
    extract PII or some other information
  • seen various TV shows and movies where detectives use this
    technique to get into places where they’re personally not
    authorized, or extract information by tricking people
A
  • Pretexting
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q
  • Attackers leave infected USB drives or optical disks at
    public places with a hope of someone picking it up out of
    curiosity and using it on their devices
  • Various download links, mostly containing malicious software,
    are thrown in front of random people hoping someone would
    click on them
A

Baiting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q
  • a person takes help of an authorized person to get access to
    restricted areas where RFID authentication or some other
    electronic barrier is present
A

Tailgating

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Tailgating
* Also known as ——
* a person takes help of an authorized person to get access to
restricted areas where RFID authentication or some other
electronic barrier is present

A

piggybacking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q
  • involves people posing as technical support
  • make random calls to a company’s employees claiming that
    they’re contacting them regarding an issue
  • involves an exchange of something with the target, for instance,
    the attacker trying to solve a victim’s genuine problem; in return,
    they will as for a gift
A

Quid Pro Quo

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q
  • Program triggered to perform a task or mission when it
    encounters some sequence of events or activities or after
    a certain amount of time lapses or when a data come
  • Friday the 13th Virus and April Fool’s Day virus
A

Logic Bombs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Logic Bombs

  • Program triggered to perform a task or mission when it
    encounters some sequence of events or activities or after
    a certain amount of time lapses or when a data come
A

Friday the 13th Virus and April Fool’s Day virus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

*A small code that a Web server asks your web browsers
to place in the computer
* Contains pertinent information that identifies your
workstation’s IP address, login name, email address and
other information about the visited site

A

Cookies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Cookies

*A ——– that a Web server asks your web browsers
to place in the computer
* Contains pertinent information that identifies your
workstation’s IP address, login name, email address and
other information about the visited site

A

small code

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

*Offers products or services that usually the user don’t
need or want

*Almost tagged as commercial advertisements
*Defined as unsolicited email

A

Spam

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Spam

*Offers products or services that usually the user don’t
need or want

*Almost tagged as commercial advertisements
*Defined as ——–

A

unsolicited email

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q
  • Fraudulent act
  • Such as stealing account information from unsuspecting
    customers, non-delivery of services and merchandise that
    are ordered online, etc.
A

Cybercrime

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Cybercrime

  • Such as stealing account information from unsuspecting
    customers, non-delivery of services and merchandise that
    are ordered online, etc.
A

Fraudulent act

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Cybercrime Types

A
  • Cyber Extortion
  • Cryptojacking
  • Cyber Espionage
  • Dark Web
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Crime involving an attack or threat coupled with a demand for
money to stop the attack

A

Cyber Extortion

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q
  • attacks use scripts to mine cryptocurrencies within browsers
    without the user’s consent
  • involve loading cryptocurrency mining software to the victim’s
    system
A

Cryptojacking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q
  • cybercriminal hacks into systems or networks to gain access to
    confidential information held by a government or other
    organization
  • gather, modify or destroy data, as well as using
    network-connected devices, like webcams or closed-circuit TV
    (CCTV) cameras, to spy on a targeted individual or groups and
    monitoring communications, including email, text messages and
    instant messages
A

Cyber Espionage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q
  • Old crime as “exit scam”
  • dark web administrators divert virtual currency held in
    marketplace escrow accounts to their own accounts –
    essentially, criminals stealing from other criminals
A

*Dark Web

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

*Dark Web
* Old crime as “———”

A

exit scam

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

*Illegal act of accessing the computer resources of some
people without their knowledge or permission
*Unauthorized access into company’s network system
*Hacker uses network or Internet connection to connect to
some other people’s computer to corrupt, change or
destroy data

A

Hacking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

Tries to guess the password of the hapless victim

A

Sniffing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

Hacker intercepts the data while it is transmitted or gain
access to the computer network system by posing as an
authorized user

A

IP Spoofing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

Cybercrime Types

A
  • Cyber Extortion
  • Cryptojacking
  • Cyber Espionage
    *Dark Web
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q
  • Crime involving an attack or threat coupled with a demand for
    money to stop the attack
A
  • Cyber Extortion
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q
  • attacks use scripts to mine cryptocurrencies within browsers
    without the user’s consent
  • involve loading cryptocurrency mining software to the victim’s
    system
A
  • Cryptojacking
39
Q
  • cybercriminal hacks into systems or networks to gain access to
    confidential information held by a government or other
    organization
  • gather, modify or destroy data, as well as using
    network-connected devices, like webcams or closed-circuit TV
    (CCTV) cameras, to spy on a targeted individual or groups and
    monitoring communications, including email, text messages and
    instant messages
A
  • Cyber Espionage
40
Q
  • Old crime as “exit scam”
  • administrators divert virtual currency held in
    marketplace escrow accounts to their own accounts –
    essentially, criminals stealing from other criminals
A

*Dark Web

41
Q

*Dark Web
* Old crime as

A

“exit scam”

42
Q

*Illegal act of accessing the computer resources of some
people without their knowledge or permission
*Unauthorized access into company’s network system
*Hacker uses network or Internet connection to connect to
some other people’s computer to corrupt, change or
destroy data

A

Hacking

43
Q

Hacking Types

A
  • Sniffing
  • IP Spoofing
44
Q
  • Tries to guess the password of the hapless victim
A
  • Sniffing
45
Q
  • Hacker intercepts the data while it is transmitted or gain
    access to the computer network system by posing as an
    authorized user
A

*IP Spoofing

46
Q
  • An act of attacking the mission-critical information technology
    infrastructure and government network system of a particular
    country
  • Goals: gain control to key computer network systems that control
    and monitor electric power grids, telecommunication system
    infrastructure, power plants and water treatment plants
A

Cyberterrorism

47
Q
  • Make full use of and derive benefit from a resource

*A software tool designed to take advantage of a flaw in a
computer system, typically for malicious purposes

A

Exploit

48
Q

*Any program or file that is harmful to a computer user
* Computer virus, worms, Trojan horses and spyware

A

Malware

49
Q
  • Stealing, encrypting or deleting sensitive data
    *Altering or hijacking core computing functions
  • Monitoring users’ activities without permission
A

Malware

50
Q

Malware Types

A
  • Virus
    *Worm
  • Trojan Horse
  • Spyware
    *Ransomware
    *Rootkit
    *Keyloggers
51
Q
  • Designed to spread from host to host and has the ability to replicate
    itself
  • Computer virus cannot reproduce and spread without
    programming such file or document
  • A type of malicious code or program to alter the way a computer
    operates and is designed to spread from one computer to another
A

Virus

52
Q

Types of Computer Virus

A

*Resident Virus
* Multipartite Virus
*Direct Action Virus
*Browser Hijacker
*Overwrite Virus
*Web Scripting Virus
*Directory Virus
* Polymorphic Virus
* File Infector Virus
*Network Virus

53
Q
  • Lives in your RAM; can interfere with normal system operation
    which can lead to corruption of files and programs
A

*Resident Virus

54
Q
  • Performing unauthorized actions in the operating system, in
    folders and other programs on the computer
A
  • Multipartite Virus
55
Q
  • Attacks certain file types typically .exe or .com files; replicate and
    infect files in folders
A

*Direct Action Virus

56
Q

*Bring you to different websites; hijackers open multiple
websites that may harm your computer

A

*Browser Hijacker

57
Q

*Overwrites content of the file, losing the original
content

A

*Overwrite Virus

58
Q

*When a link is clicked, the virus will automatically
download or direct o malicious websites

A

*Web Scripting Virus

59
Q
  • Changes file paths thus it will be difficult to locate the original
    app
A

*Directory Virus

60
Q
  • Special method of encoding and encrypting, making it difficult
    for antivirus to identify
A
  • Polymorphic Virus
61
Q
  • Can slow down the program and produce other damaging
    effects
A
  • File Infector Virus
62
Q
  • Spread throughout the Local Area Network (LAN) and the Internet; replicates
    through shared resources
A

*Network Virus

63
Q
  • Can self-replicate without a host program and typically spreads
    without any human interaction or directives from the malware
    authors
  • Often uses parts of the operating system that are automatic and
    invisible to the users
A

Worm

64
Q

Types of Worms

A

*Internet Worms
*Email Worms
*Instant Messaging Worm
*File-sharing Worms

65
Q
  • Can replicate themselves onto any computer being
    used to access the website in question
    *Distributed to other connected computers through the
    Internet and LAN connections
A

*Internet Worms

66
Q

*Have double extensions (eg. .mp4.exe; docx.exe;
pdf.exe)
*When victims click on the attachment, copies of the
same infected file will automatically be sent to
addresses from their contacts
*Body — might contain a link to fool the users to click;
taken to another website that will automatically start
downloading malicious software to the computer

A

*Email Worms

67
Q

Accompanied by short messages to trick the victim into thinking
of something
* If clicked, the exact same message will be sent to their contacts
* Can be solved by changing the password

A

*Instant Messaging Worm

68
Q
  • File sharing and peer-to-peer file transfers are still used by
    millions of users
  • Unknowingly exposing the computer to the threat
  • Once downloaded and opened, an executable file (hidden) may
    be discreetly installed
A

*File-sharing Worms

69
Q
  • Often disguised as legitimate software
  • Employed by cyber-thieves and hackers trying to gain access to
    users’ system
  • Users are tricked in some form of social engineering into loading
    and executing Trojans on their systems
  • Once activated, cybercriminals can steal, spay and gain backdoor
    access to your system
A

Trojan Horse

70
Q

Types Trojan Horse

A

*Backdoor Trojan
* Exploit
*Rootkit
*Trojan-banker
* Trojan-DDOS
* Trojan-FakeAV
*Trojan-Dropper
*Trojan-GameThief
*Trojan-IM
*Trojan-Ransom
* Trojan-SMS
* Trojan-Spy
* Trojan-Mailfinder

71
Q

Trojan Horse

  • Known as Trojan
  • Often disguised as ——–
A

legitimate software

72
Q

*Unwanted software that infiltrates the computing device,
stealing internet usage data and sensitive information
*A type of malware designed to gain access to or damage
the computer, often without the knowledge
*Gathers information and relays it to advertisers, data firms
or external users

A

Spyware

73
Q

Types of Spyware

A

*Adware
*Tracking Cookies
* System Monitors

74
Q
  • Tracks browser history and downloads, with the intent
    of predicting what products or services the user is
    interested in
    *Will display advertisements for the same or related
    products or services to entice the user to click or make
    a purchase
    *Used for marketing purposes and can slow down the
    computer
A

*Adware

75
Q
  • Track users’ web activities (search history, downloads)
    for marketing purpose
A

*Tracking Cookies

76
Q
  • Can capture everything the user does in the computer
  • Can record all keystrokes, emails, chat-room dialogs,
    websites visited and programs run
    *Often disguised as freeware
A
  • System Monitors
77
Q

*A subset of malware in which the data on the victim’s
computer is locked (encryption) and payment is
demanded before the ransomed data is unlocked
(decrypted)
*Attacks is nearly always monetary
* Payment is demanded in virtual currency (Bitcoin) so that
the cybercriminals identity will not be known

A

Ransomware

78
Q
  • Can spread and infect in email attachments, infected
    software applications, infected external storage devices
    and compromised websites
    *Have remote desktop protocol and other approaches that
    do not rely on any form of user interaction
A

Ransomware

79
Q

*Will try and pose as security software or tech support
* Victim may receive pop-up notifications saying malware
has been discovered on the system
*Not responding may lead to more pop-ups

A

*Scareware

80
Q

*Designed to completely lock a user out of their
computer
* The victim may see what looks to be an official
government seal, leading the victim into believing they
are the subject of an official inquiry
*After notification, the victim is given instructions on
how to pay

A

*Screen Lockers (Lockers)

81
Q

*Attacker will gain access to and encrypt the data of the
victim, then ask for a payment to unlock the files
* There is no guarantee that the victim will get access to
their data back even if they will negotiate

A

*Encrypting Ransomware (Data Kidnapping)

82
Q
  • Attacker threatens to publish the data online if the victim does
    not pay a ransom
A

*Doxware

83
Q
  • Steal data from a phone or lock it and require a ransom to return
    the data or unlock the device
A
  • Mobile ransomware
84
Q

*A collection of software tools that gives a threat actor
remote access to and control over a computer or other
system
*Open a backdoor on victim systems to introduce malicious
software
*Often attempt to prevent detection of malicious software
by endpoint antivirus software
*Once installed, a rootkit gives the remote actor access to
and control over almost every aspect of the operating
system

A

Rootkit

85
Q

*Designed to change the functionality of an operating
system
* Typically adds its own code and own data structure
* Many kernel mode rootkits exploit the fact that OSes
allow device drivers or loadable modules to execute
with the same level of system privileges as the OS
kernel

A

*Kernel Mode

86
Q
  • Executes the same way as an ordinary user program
  • may be initialized like other ordinary programs during system
    startup, or they may be injected into the system by a dropper
A

*User Mode Rootkit (Application Rootkit)

87
Q
  • infects the master boot record of a hard drive or other storage
    device connected to the target system
  • able to subvert the boot process and maintain control over the
    system after booting and, as a result, have been used
    successfully to attack systems that use full disk encryption.
A
  • Bootkit (Bootloader Rootkit)
88
Q

*take advantage of software embedded in system
firmware and install themselves in firmware images
used by network cards, BIOS, routers or other
peripherals or devices.

A

*Firmware Rootkit

89
Q

*Keystroke loggers or system monitor
* a type of surveillance technology used to monitor and
record each keystroke typed on a specific
computer’s keyboard
* often used as a spyware tool by cybercriminals to
steal personally identifiable information (PII), login
credentials and sensitive enterprise data.

A

Keyloggers

90
Q

Keyloggers

*——– or ——–
* a type of surveillance technology used to monitor and
record each keystroke typed on a specific
computer’s keyboard

A

Keystroke loggers
system monitor

91
Q

may also be used by employers to observe employees’
computer activities, parents to supervise their children’s
internet usage, users to track possible unauthorized
activity on their devices or law enforcement agencies to
analyze incidents involving computer use

A

Keyloggers

92
Q
  • serves as a connector between the computer keyboard and the
    computer
  • designed to resemble an ordinary keyboard PS/2 connector, part
    of the computer cabling or a USB adaptor, making it relatively
    easy for someone who wants to monitor a user’s behavior to
    hide such a device
  • may also come in the form of a module that is installed inside the
    keyboard itself
A

*Hardware-based Keylogger

93
Q
  • does not require physical access to the user’s computer for
    installation
  • someone who wants to monitor activity on a particular
    computer, or it can be malware downloaded unwittingly and
    executed as part of a rootkit or remote administration Trojan
    (RAT)
A

*Keylogger Software