keywords for ports and malware Flashcards

1
Q

HTTP

Port and meaning

A

Port 80
Hypertext transfer protocol
converts IP addresses into URLs and sends them off for the user to connect to.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

HTTPS

A

Port 443
Hypertext Transfer Protocol Secure
(encrypted)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

FTP

A

file transfer protocol
20/21
uses 2 ports and connections (one for communications monitoring, and one for the actual file transfer)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

POP3

A

Post Office Protocol version 3
fetching mail by network…not downloading
110

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

smtp

A

simple mail transfer protocol
sending mail
25

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

imap

A

internet mail access protocol
accessing mail by downloading
143

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

port

A

determines the entry way into a network, and which protocol to use.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

firewall

A

can be digital or physical
prevents access from outside users into the network, also contacts a proxy server when connecting to a server as to hide your info from listeners.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

OSI

A

the seven layer conceptual model for TCP/IP.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

TCP/IP

A

Transmission control protocol/Internet protocol.

rules for conversing with other networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Proxy servers

A

A fake network used to confuse people that aren’t part of the conversation between actual networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

servers

A

A central point of a network that can store files and hold the ports for a network too.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

ip address

A

The general location or name of a server, however is converted to a URL for easy understanding by humans.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

internal threats

A

Threats that come from within the business itself.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

external threats

A

threats that come from outside of a business like malware.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

anti malware

A

uses many methods to protect the device from malware. not preventative like firewall.

17
Q

trojan

A

disguises as a legitimate program, but actually contains malware

18
Q

rootkit

A

malware that attempts to gain admin rights on a network when they shouldnt.

19
Q

bot

A

A bunch of fake users that can be designed to create DDOS attacks on a server, can be used for good aswell.

20
Q

DDOS

A

Denial Of Service attacks prevent a network or server from working by overloading it with instructions by using bots.

21
Q

virus

A

destroys, replicates or changes files on the system, reproduces on the files them selves, executed by unknowing user.

22
Q

worm

A

Like a virus, however it replicates on the network, and affects the network.

23
Q

adware

A

overloads your computer with annoying pop-ups that entice the user to download something, which is often a virus itself.

24
Q

ransomware

A

Encrypts all data on a five and makes the user pay a ransom (often in bitcoin because its untraceable) to get the encryption key to get their data back.

25
Q

sandbox

A

An isolated area on a network or computer that is used to test what a program does if it’s suspicious, if it is malware, it is removed from the system.

26
Q

signature analysis

A

analyses the hash of a code, this is shorter but malware can get away if their hash (shortened code) is close to a legitimate program’s.

27
Q

behaviour analysis

A

uses a sandbox to test what a program does…if malicious then it deletes the program.

28
Q

heuristic analysis

A

A slow process, but it scans the entire code of a program to see if any of it is malicious.

29
Q

zero day attack

A

companies often rol out patches on a day of the week, hackers will often wait until this day so that they announce what the vulnerabilities are, then attack them, this is why updates should be applied almost immediately.

30
Q

attack vectors

attack surface

A

attack vectors are the entry ways that a hacker or malware can get in, they are the “cause” of an attack.

the attack surface is all of the attack vectors combined.