Network Security And System Software Flashcards
Name three types of malware
Viruses, Trojans, Ransomware
Name 4 prevention methods
Anti-malware, Anti-virus, Encryption, Acceptable Use Policies
Define Malware
Malicious Software; Executable programs run on a computer
What do viruses do?
Infect computers; Replicate their code in other programs, infect other computers, delete, corrupt and modify files
What does a worm do?
Replicates itself in order to spread to other computers; Cause damage, slow down network
What is a computer Trojan?
They have a program, game or cracked file which is something the user wants; they have a negative program code which causes damage, takes control or provides access to the computer
What is ransomware?
Software that holds a computer hostage by locking or encrypting access; once a random is paid, access is restored
Name two ways that hackers can exploit technical vulnerabilities
Unpatched software; if updates are not downloaded the software can become vulnerable
Out of date Anti-Malware; won’t be able to detect the latest viruses
What is social engineering?
The ability to obtain confidential information by asking people for it
What is shoulder surfing?
The ability to get information or passwords by observing as someone types them in; Looking over someone’s shoulder, using a CCTV camera
What is phishing?
Social engineering, normally an email but can be a text or call, pretending to be a bank or website; trying to get usernames, passwords, credit card details
How can you find a phishing email?
- Greetings; the phishes don’t know your name so the greeting isn’t personalised
- Senders address; normally a variation of a genuine address
- Forged link; the link looks genuine but may not link to the website given
- Request for personal information; genuine organisations never do this
- Sense of urgency; criminals try to persuade you that something bad will happen if you don’t act fast
- Poor spelling and grammar
What is a Denial of Service (DoS) attack?
A hacker will use or infect a computer so that:
It sends as many requests to the server as possible (known as a flood)
The server can’t respond fast enough so slows down or goes offline
In a Distributed Denial of Service (DDoS) attack many computers are used to send requests
What is a Man In The Middle (MITM) attack?
Allows the attacker to intercept communications between the user and server. The attacker can then:
Eavesdrop to find passwords and personal information
Add different information to a web page or other communications such as emails
Connecting to an unencrypted Wi-Fi makes it easy to perform a MITM attack
How can a USB be used to infect a computer?
An unsuspecting employee may pick up a USB from a company car park and insert it into their computer. The malware can now install onto the computer.