Malware, Electronic Infection & Cyber Crime Flashcards

1
Q

What are the different types of electronic infections

A

Computer virus
Trojan horse
Worm
Spyware & Adware
Ransomware
Email malware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is a computer virus

A

A secret program which contains the instructions to make copies of itself and insert this copy into legitimate programs. Each time the legitimate program runs, a new copy of the virus is made (called replication) they can remain in memory or on the disk. They usually attack data as well

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is a Trojan horse

A

Pretends to be a useful program, often a gimmicky or funny one, but in reality it has a hidden agenda to cause damage. It doesn’t make copies of its and it succeeds because enough people copy it download it without realizing it’s real purpose

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is a worm

A

A secret program which makes copy after copy of itself (without needing a host program) and can fill up memory and disk space. Can also copy itself from machine to machine over a network or the internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is spyware and adware

A

Programs that attach onto your operating system usually from the internet. They are designed to track your internet habits, annoy you with unwanted sales offers or generate traffic for their host website.
not to be confused with ‘cookies’ which are legitimate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is ransomware

A

A program which infects your machine either through email or the internet. It encrypts the data on personal computers, and prevents users from accessing their files until a ransom is paid. Some versions of ransomware will claim a computer has been “used for illegal activity” and/or has been “locked by the police”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is email malware

A

Any type of malware can be attached to or inserted in an email and this is now the most common method of transmission. Usually transmission is continued when a further message is sent to people in the victims address book

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is phishing

A

Phishing aims to get the user to bypass security and is the most common type of scam globally. often it takes the form of an email or message from an apparently legitimate source urging you to login to their site to update some details.
In reality it uses a copy of the legitimate site and wants to obtain user details and eventually credit card details/money.
Phishing attacks can also be made via phone calls.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What makes spear phishing different to phishing

A

Spearfishing is a more sophisticated attack that includes customized information (name/phone number/email address) that makes the attacker seem more like a legitimate source

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

When was the first advance fee scam

A

The Spanish prisoner scam dates back to the late 1700s.
The Nigerian scam has many variance and probably started with letters, then telegram and nowadays uses emails

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What problems can be caused by these infectious programs

A

Causes unexpected system crashes, hangs or shutdown

Alters the behavior and functionality of application programs

Corrupts the directory information stored on the disc, encrypting data, deleting data or hiding files

Causes problems with printing documents, starting applications and opening and closing windows

Sends itself to your contacts and creating a bad impression and ill-will

Fills RAM and prevents other data being read

Pesters you with pop-ups

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is a Distributed-Denial-of-Service attack (DDoS)

A

DDoS attacks affect hosts of websites or other online services and aim to make the service unavailable to its intended users by overloading it with fake random communications – often generated by bots.
It can also be used to block a mobile phone and can be political or commercial in nature

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

How do you avoid malware

A

Use an up-to-date, fully supported operating system

Install security patches as soon as they become available

Never click links or attachments in unsolicited emails

Remember a work PC not a – and it’s commercial use should be paramount

Don’t be the weakest link

How well did you know this?
1
Not at all
2
3
4
5
Perfectly