Module 3 Flashcards
What is the primary goal of cyber security?
To protect computers and data from risks and threats
Cyber security is akin to securing the doors to our homes.
Define ‘Cracker’ in the context of cyber security.
A computer-savvy programmer who creates attack software
Crackers are often associated with malicious intent.
What are ‘Script Kiddies’?
Unsophisticated computer users who execute pre-written programs
They often lack deep technical knowledge.
List three leading threats in cyber security.
- Viruses
- Worms
- Trojan Horses
Other threats include logic bombs, social engineering, rootkits, and botnets.
How does a virus function?
It attaches itself to a program or file and activates upon execution
Viruses can be benign or malignant and may cause data loss.
What is a worm in cyber security?
An independent program that replicates itself across network connections
Worms can spread without user intervention.
What is a Logic Bomb?
Malware that executes upon certain conditions being met
Often used in legitimate programs that malfunction under specific circumstances.
True or False: A Trojan Horse is a benign program.
False
A Trojan Horse masquerades as a benign program but harms the system.
What is social engineering?
Manipulating people into divulging confidential information
Techniques often resemble confidence tricks.
Define Phishing.
Counterfeit emails requesting sensitive information
Commonly includes requests for SSN, credit card numbers, or passwords.
What is Pharming?
Counterfeit web pages that mimic real websites to collect information
These pages extract sensitive account information.
What is a Man in the Middle attack?
An attacker pretends to be a legitimate network access point
This allows the attacker to intercept communication between two parties.
What is a rootkit?
A collection of programs installed by a hacker to maintain access
Rootkits can hide their presence and modify the operating system.
List three examples of personal information.
- Social Security Number
- Driver’s license number
- Account passwords
This information can be used for identity theft.
What are common symptoms of a security compromise?
- Antivirus detects a problem
- Unexplained disk space loss
- Pop-ups selling security software
- Unexpected files or transactions
Other symptoms include slow performance and unusual system behavior.