Security Flashcards
Name 5 ways in which a virus can infect a computer
Infected Backing Storage Spread by an infected USB stick Visiting Infected/Compromised Websites Install Software Opening an infected email
Name 4 things a virus can do
Camouflage - dummy instructions
Watching - waits till particular action is met
Replication - self-replicating
Delivery - payload is activated
Name 4 ways in which an anti-virus software can detect virus’
Use of checksum
Searching for a virus signature
Heuristic detection
Memory Resident Monitoring
What are 4 hacking methods?
Brute Force
Back Doors
Exploiting vulnerabilities
Social Engineering
How do you spot a phishing attempt?
Look at the Subject Senders Address Expect to know your name Look for hyperlinks Spelling and Grammar
Name 5 different types of DOS attacks
Physical - break wires
Exploits - vulnerabilities in the program
Bandwidth Starvation - flood server with information
Hardware Attacks - routers may be modified
Resource Starvation - Using up their backing storage
What might be some costs after a DOS or DDOS attack
Determining the nature of the attack
Repair and response to the attack
Devising and implementing safeguards
Additional admin
What is the difference between a passive and an active attack
Passive - where an attacker may just monitor a network
Active attacks - when data will actively modified, like changing it or deleting it on a network
What are the two ways to encrypt data
Symmetric key (secret) Asymmetric key (private/public)
Name pros and cons of assymmetric encryption
Pros - Private key never needs distributing
Can be used to implement digital signatures
Cons - Slower than symmetric
Requires far more power
Name pros and cons of symmetric encryption
Pros - key doesn’t need sent with message
System is more straightforward
Cons - Key has to be installed with the receiver first
What 3 things can a digital certificate contain?
Public key
Owners name
Expiration and Issuer
What problems arise with client side validation?
Users can modify the code
Not all users have scripting running on browsers
Coding Errors
Name some biometrics.
Fingerprints Hand biometrics Palm vein biometrics Facial recognition Voice Recognition Retina/Iris Scan
What are some advantages of using biometrics?
Don’t have to remember passwords
Reduces fraud