Malicious attacks ,Threats and vulnerabilities Flashcards

1
Q

What is a botnet

A

A botnet is a bunch of Internet-connected computers under the control of a remote hacker.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

where can attacks happen?

A

Malicious attacks can occur in any of the seven domains of an IT infrastructure. Typically, malicious attacks are targeted on the User, Workstation, LAN, and LAN-to-WAN domains.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

what are you trying to protect

A

customer data
Name ,address ,phone,NI ,number,dob ,card holder ,data

IT and network infastructure
Hardware ,software and services

intellectual property
Sensitive or secretive data such as patents, source code, formulas, engineering plans or designs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

what are your trying to protect?

A

Finances and financial dataBank accounts, credit card data, and financial transaction data.

Service availability and productivityThe ability of computing services and software to support productivity for humans and machinery

ReputationCorporate compliance and brand image

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

should companies report a data breach

A

It is part of your incident response plan is to report your data breach to the required regulatory authorities

-you may be legally required to

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

should companies report a data breach(downsides)

A

downside of disclosing a data breach:
-The company suffers public embarrassment criticism
-security practises will be scrutinised
-fine

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

should companies report a data breach (benefits)

A

company shows commitment to honesty and transparency
Reassurance: You can clearly communicate the remediation and prevention of further harm.
Save companies money

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

hackers

A

hacker often describes someone who breaks into a computer system without authorization.
In most cases that means the hacker tries to take control of a remote computer through a network or by software cracking.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

types of hackers

A

Black-hat hackers
white-hat hackers
grey hat hackers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

black hat hackers

A

Tries to break IT security and gain access to systems with no authorization in order to prove technical prowess.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

White -hat hackers

A

White-hat hacker: Also called an ethical hacker, is an information systems security professional who has authorization to identify vulnerabilities and perform penetration testing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

grey-hat hackers

A

: A hacker who will identify but not exploit discovered vulnerabilities, yet may still expect a reward for not disclosing the vulnerability openly.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

what is a security breach

A

Any event that results in a violation of any of the C-I-A security tenets

-Some security breaches disrupt system services on purpose
-Some are accidental and may result from hardware or software failures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Activities that reach a security breach

A

denial service of attack
distributed denial service of attack
unacceptable web browsing behaviour
wiretapping
accidental data modifications

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Denial service of attack

A

A coordinated attempt to deny service by occupying a computer to perform large amounts of unnecessary tasks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

DOS examples

A

Protection against DoS using
Intrusion prevention system (IPS)
Intrusion detection system (IDS)

Examples of DoS Attacks:
SYN flood
Smurfing

14
Q

logic attacks

A

use software flaws to crash or seriously hinder the performance of remote services

15
Q

Flooding attacks

A

Providing false information about the status of network services.

16
Q

Distributed denial service of attack

A

overloads computers and prevents legitimate users from gaining access

17
Q
A