Security #9.5 Flashcards
What is cybersecurity?
- Range of measures taken to
- protect computer systems, networks
- and data from unauthorised access/cyberattack
Lets say:
Ways of protecting PC, networks or data from unauthorised access (cyberattack)
How are cyberattacks carried out?
Malware
What is malware?
Malicious software
4 types of malware?
- Viruses
- Worms
*Spyware - Trojans
What are viruses?
(malware)
- Programs that can replicate themselves
and be spread from one system to another - By attaching themselves to host files
Use of virus?
(malware)
Modify/corrupt info of targeted computer system
What are worms?
(malware)
- Self-replicating programs
- Can identify vulnerabilities in OS
Use of worm?
(malware)
Enable remote control of infected computer
What is spyware?
(malware)
- Installed by opening attachments/downloading infected software
Use of spyware?
(malware)
Collect stored data without user’s knowledge
1 type of spyware?
(malware)
Keyloggers
What does a keylogger do?
(spyware)
- Track keystrokes
- Can capture passwords of accounts
Parents use these ig to monitor children online activity O_o
What are trojans?
+ use
(malware)
- Program appearing to perform useful function
- But provides a back door
+ Enables data to be stolen
What are the 6 ways of protection against malware
(imo just think of 3 but whatever ya think of first)
- Install virus protection software
- Use firewall
- Keep OS up-to-date
- Use latest ver. of web browser
- Be aware if phishing emails
- Malicious software removal tool
Describe virus protection software
AKA anti-virus software
- Program loaded into mem whilst pc running
- Monitors activity on pc for signs of virus infection
- Also always upd these regularly
How does anti-virus recognise viruses?
- Virus has its unique ‘signature’
- Antivirus stores that in database
*PC scanned if signature in database exist
Describe firewall
- Software/hardware security system
- Controls incoming & outgoing network traffic
- Packets of data analysed, decides if they allowed or not
Basic function of firewall?
- Monitors:
where data has come from,
where it’s going,
decides if communication is allowed