Security Flashcards

1
Q

Common network based attacks (4)

A
  1. Eavesdropping
  2. Denial of Service attack (and DDoS)
  3. Port scanning
  4. Man in the Middle attack
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is an eavesdropping attack?

A

An eavesdropping attack, also known as network sniffing, occurs when a hacker captures network packets that workstations connected to your network send and receive.

Eavesdropping attacks can compromise your organization’s sensitive data, such as passwords, which can lead to other, more damaging attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is a denial of service (DoS) attack?

A

This is a type of attack that limits the function of a network app, or renders an app or network resource unavailable.

Hackers can initiate a DoS attack in several ways, and often are aware of vulnerabilities in the target app that they can exploit to render it unavailable. Hackers typically perform Dos attacks by overloading a service that replies to network requests, such as Domain Name System (DNS), with a large number of fake requests in an attempt to overload and shut down a service or the server that hosts the service. A distributed denial of service (DDoS) attack is a version of a DoS attack.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

How can you tell if an email is legitimate?

A
  1. Hover over links to uncover the URL
  2. Check for poor grammar and spelling errors
  3. Look for company contact information and brand accuracy
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are some examples of cyberattacks?

A
  1. Malware
  2. Distributed Denial-of-Service (DDoS) attack
  3. Phishing
  4. SQL injection attacks
  5. Cross-site scripting (XSS)
  6. Botnets
  7. Ransomware
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What’s is a Port scanning attack?

A

This is an attack where hackers exploit a network to query hosts for open ports on which they listen for client requests and use other attack techniques to access the services that are running on the computer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is a Man-in-the-middle (MITM) attack?

A

This is an attack where the attacker uses a computer to impersonate a legitimate host on the network with which your computers are communicating.

Notes:

The attacker intercepts all of the communications that are intended for a destination host. The attacker might wish to view the data in transit between the two hosts, but also can modify that data before forwarding the packets to the destination host.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are some of the types of malware

A
  1. Viruses
  2. Worms
  3. Adware
  4. Trojans
  5. Spyware
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are some of the ways to help prevent cyberattacks?

A
  1. Investing in a reliable cybersecurity system.
  2. Hiring IT administrators that will keep a close watch on all networks within a business
  3. Using a Two-Factor or Multi-Factor Authentication system.
  4. Educate your employees through ongoing internal training on cyberattacks and cybersecurity, and what steps to take if a data breach was to occur.
  5. Hire a third-party security team to assist your internal IT department with monitoring business networks and systems.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

How can a hacker get someone’s password?

A
  1. Data breaches
  2. Brute force
  3. Phishing
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is a strong password?

A
  1. Uses at least 12 characters. 14 or more is better.
  2. Uses a combination of upper and lowercase letters.
  3. Uses a combination of numbers and symbols.
  4. Does not use a word that can be found in a dictionary, or the name of a person, character, product, or organization.
  5. Is different from your other passwords.
  6. Does not include your name, a family member’s name, or a pet’s name. These are too easy to guess.
  7. Does not include phone numbers, birthdays, addresses, or Social Security numbers.
  8. Is not a popular password like “123456”, “qwerty”, “password”, “111111”, or “password123”
  9. Is updated regularly. Cybersecurity experts recommend creating a new password every three months.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Name the types of cyber security threats (MAPRIS)

A
  1. Malware
  2. Social Engineering Attacks
  3. Phishing
  4. Ransomware
  5. Insider Threats
  6. Advanced persistent threats
How well did you know this?
1
Not at all
2
3
4
5
Perfectly