Network Threats, Attacks and Preventions Flashcards
What two words does malware consist of
Malicious
Software
Malicious software
What is malware
Harmful computer programs
What are four types of malware
Computer Virus
Ransomware
Trojan Horse
Worm
What is a Computer Virus
These infect computers by replicating the code in other programs, along with infecting other computers.
They also deal harm to the computer by deleting, modifying and accessing files
What is a Worm
A virus that replicates itself to cause damage to other computers.
These type of malware don’t deal damage to harmed computers and instead slows them down, and slows down the network
What is a Trojan Horse
These type of viruses have programs, games or cracked files that users may commonly want. In reality, it is a negative program code causing damage, take controls or provides unlimited access to the computer
What is ransomware
A malware type which holds a computer hostage by locking or encrypting access to it. Due to encrypted data, no one can access it, not even a cyber security professional is able to unlock the data unless there’s available backups. To be granted access, we may be forced to pay the ransom a high price
What is exploiting
Taking advantage of a vulnerability
What are the two types of exploiting technical vulnerabilities
Unpatched software
Out of data anti malware
What is unpatched software
If software updates and security updates aren’t installed, software will be vulnerable to malicious activity
What is out of data anti malware
When software such as antivirus isn’t regularly updated, it is unable to detect the latest viruses
What is confidential
A set of rules
What is social engineering
Ability to obtain confidential information by asking for it.
This is a type of confidence trick that con artists specialise in
What is shoulder surfing
Ability to get information or passwords by observing as someone types them in
What is phishing
A type of messaging scam done by many con artists.
This type of fraud scheme is when emails, texts or phone calls are sent back to users, pretending to be from a bank or website. Phishing scammers will go to extreme lengths to get what they want.