Security #9.5 Flashcards

You may prefer our related Brainscape-certified flashcards:
1
Q

What is cybersecurity?

A
  • Range of measures taken to
  • protect computer systems, networks
  • and data from unauthorised access/cyberattack

Lets say:
Ways of protecting PC, networks or data from unauthorised access (cyberattack)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

How are cyberattacks carried out?

A

Malware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is malware?

A

Malicious software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

4 types of malware?

A
  • Viruses
  • Worms
    *Spyware
  • Trojans
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are viruses?

(malware)

A
  • Programs that can replicate themselves
    and be spread from one system to another
  • By attaching themselves to host files
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Use of virus?

(malware)

A

Modify/corrupt info of targeted computer system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are worms?

(malware)

A
  • Self-replicating programs
  • Can identify vulnerabilities in OS
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Use of worm?

(malware)

A

Enable remote control of infected computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is spyware?

(malware)

A
  • Installed by opening attachments/downloading infected software
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Use of spyware?

(malware)

A

Collect stored data without user’s knowledge

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

1 type of spyware?

(malware)

A

Keyloggers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What does a keylogger do?

(spyware)

A
  • Track keystrokes
  • Can capture passwords of accounts

Parents use these ig to monitor children online activity O_o

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are trojans?
+ use

(malware)

A
  • Program appearing to perform useful function
  • But provides a back door

+ Enables data to be stolen

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are the 6 ways of protection against malware

(imo just think of 3 but whatever ya think of first)

A
  • Install virus protection software
  • Use firewall
  • Keep OS up-to-date
  • Use latest ver. of web browser
  • Be aware if phishing emails
  • Malicious software removal tool
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Describe virus protection software

A

AKA anti-virus software

  • Program loaded into mem whilst pc running
  • Monitors activity on pc for signs of virus infection
  • Also always upd these regularly
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

How does anti-virus recognise viruses?

A
  • Virus has its unique ‘signature’
  • Antivirus stores that in database
    *PC scanned if signature in database exist
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Describe firewall

A
  • Software/hardware security system
  • Controls incoming & outgoing network traffic
  • Packets of data analysed, decides if they allowed or not
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Basic function of firewall?

A
  • Monitors:
    where data has come from,
    where it’s going,
    decides if communication is allowed
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

How does the firewall do the basic function?

A

By checkin g a list of pre-defined rules

20
Q

Explain ‘keep your operating system up to date’

A

New way to bypass OS = install security patches issued

21
Q

Explain ‘use latest ver. of web browser’

A

Same as ‘keep your operating system up to date’

Update installed after restarting browser

22
Q

Explain ‘look out for phishing emails’

A
  • Emails ask you to confirm personal details

FAKE AF

23
Q

Describe malicious software removal tool

When should u use it?

A
  • literally just removes the malware
  • use it if you got malware in computer
24
Q

List 6 forms of cyberattacks

(although u could think of 3, u probably might want to know these all)

A
  • Shoulder surfing
    *SQL injection
  • DoS attacks
  • Password-based attacks
    *IP spoofing
    *Social engineering
25
Q

Explain shoulder surfing

(cyberattack)

A
  • Using direct observation to get info
    e.g. guy using ATM machine
26
Q

Explain SQL injection

(cyberattack)

A
  • Technique of malicious users,
    injecting SQL commands into SQL statement,
    via web page input
  • Injected SQL commands alter SQL statements
  • Compromises security of info held in database

( seems a lot to remember )

27
Q

DoS attacks short for?

(cyberattack)

A

Denial of service attacks

28
Q

Explain DoS attacks?

(cyberattack)

A
  • Technique used to make website/server unavailable to legitimate users
  • By swamping system with fake requests
  • Involves a single internet connection
29
Q

DDoS short for?

(cyberattack)

A

Distributed Denial of Service

30
Q

Explain DDoS attacks?

(cyberattack)

A
  • Same as DoS however
    *Involves multiple connected devices
  • Distributed across the internet
  • Causes huge volumes of traffic
31
Q

Explain password-based attacks

(cyberattack)

A

Cyber criminals using ways of finding out ur password

32
Q

What are the 3 types of password-based attacks?

(cyberattack)

A
  • Dictionary attack
    *Brute force attack
  • Guess
33
Q

Explain dictionary attack

(password-based attacks)

A
  • Uses simple file containing words found in dictionary
  • Uses common words people use as their password
34
Q

Explain brute force attack

(password-based attacks)

A

*Similar to dictionary attack
* But able to detect non-dictionary works
* Through all possible alphanumeric combinations

e.g. aaa1 to zzz10

  • Not quick, tho eventually uncovered
35
Q

Explain guess

(password-based attacks)

A
  • Passwords aren’t random
  • Likely based upon
  • interests
  • hobbies
  • pet names
  • family names
  • A well educated guess often works
36
Q

Explain IP spoofing

(cyberattack)

A
  • spoof = hoax = trick
  • Attacker changes IP address of legitimate host
  • Visitor who types URL of site
  • Sent to spoofed web page
  • Can steal sensitive data/install malware
37
Q

Explain social engineering

(cyberattack)

A
  • Involves tricking user to give out sensitive information

a good example is tech supporters
I mean phishing.

38
Q

3 ways of identifying vulnerabilities in PC?

A
  • Footprinting
  • Ethical hackings
  • Penetration testing
39
Q

Explain footprinting

(identifying vulnerabilities)

A
  • Involves gathering all info about PC/network/devices attached to it
  • Enables penetration tester to discover
  • How much detail at tacker could find out
  • Allows organisations to limit technical info publicly available
40
Q

Explain ethical hackings

(identifying vulnerabilities)

A
  • Needs perms from system owner to do this
  • Ethical hacker attempts to bypass system security
  • In search for any weak points
    to be exploited by malicious hackers
  • The info used by owner to improve system security
41
Q

Explain penetration testing

(identifying vulnerabilities)

A
  • Subset of ethical hacking
  • Process of testing PC/network
    to find vulnerabilities
  • Tests can be automated with software applications/manually
42
Q

What are the 4 penetration testing strategies?

(identifying vulnerabilities)

A
  • Targeted testing
  • External testing
  • Internal testing
  • Blind testing
43
Q

Explain targeted testing

(penetration testing)

A
  • Carried out by organisations ICT team
  • Work together ig
44
Q

Explain external testing

(penetration testing)

A
  • Find out if an outside attacker
  • can get in and how far
  • they can get in once gained access
45
Q

Explain internal testing

(penetration testing)

A
  • Estimate how much dmg
  • dissatisfied employee could cause
46
Q

Explain blind testing

(penetration testing)

A
  • Simulate actions and procedures of a real attacker
  • By severely limiting info given to team performing test