security Flashcards
1
Q
what is malware ?
A
Malware is any type of harmful program that seeks to damage or gain unauthorised access to your computer system
2
Q
virus
A
- can replicate itself
- and spread from system to system by attaching itself to infected files
- only activated when opened by a human
- once activated , it can change data or corrupt a system so that it stops working
3
Q
worm
A
- can replicate itself
- and spread from system to system by finding weaknesses in software
- does not need an infected file or human interaction to spread
- can spread very quickly across a network once it has infiltrated it
4
Q
what is a trojan?
A
- a harmful program that looks like legitimate software so users are tricked into installing it
- secretly ives the attacker backdoor access to the system
- do not self replicate or infect other files
5
Q
what is spyware ?
A
- secretly records the activities of a user on a computer
- aim of spyware is to record usernames, passwords and credit card information
- all recorded information is secretly passed back to the attacker to use
6
Q
keylogger
A
- secretly records the key presses of a user on a computer.
- data is stored or sent back to the attacker
- aim of keylogger is to record usernames, password and credit card information
- keyloggers can be downloaded or plugged into the USB port
7
Q
ransomware?
A
- locks files on a computer system using encryption so that a user can no longer access them
- the attacker demands money from the victim to decrypt (unlock) the data
- attackers usually use digital currencies like bitcoin which makes it hard to trace them
8
Q
what is phishing ?
A
- the method of misleading individuals or organizations into sharing sensitive information , often through the use of emails
- phishers may pose as trusted company like amazon or YouTube to direct users to open malicious attachments or encourage them to follow fraudulent links to steal their data
9
Q
what is social engineering?
A
- the means to trick others into revealing their personal data by posing as a trusted source
- e.g. impersonating an IT technician of a school via email and asking for a student’s username and password
10
Q
what is interception?
A
- when data packets on a network are intercepted by a third party (e.g hacker) and copied to a different location than the intended destination.
- software called packet sniffers are used to intercept and analyse data packets
11
Q
what software is used to intercept and analyse data packets ?
A
software called packet sniffers are used to intercept and analyse data packets
12
Q
what is physical theft?
A
- computer systems or storage devices may be stolen in public or from offices
- unwanted systems and storage media should be disposed of securely as data could be stolen from discarded information, such as old CDs or even printed paper
13
Q
what is hacking ?
A
- the method of exploiting weaknesses in a system or network to create, view, modify or delete files without permission.
- A hacker is anyone who gains access to data or systems that they do not have authority to access
14
Q
what does DoS and DDoS stand for?
A
denial of service attack
distributed denial of service attack
15
Q
what is a DoS attack?
A
- when a computer repeatedly sends requests to a server to overload the system
- a server overload will slow the system and may take websites offline temporarily
16
Q
what is a DDos Attack?
A
- a coordinated attack using a botnet of infected systems to overload a server with requests.
- A botnet is a large group of devices controlled and used maliciously by an attacker
17
Q
what does SQL stand for?
A
Structured Query Language