Security Risks Flashcards

1
Q

Virus?

A

A virus is a program, that can replicate itself by copying its source code into other programs (called ‘executable files’) and can also cause damage to the computer system when it runs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Worm?

A

A worm is a malicious computer program that replicates itself in order to spread to other computer systems. Often spreads through a network and unlike a virus does not need to attach itself to a program. A worm replicates itself through computer networks, executing its code in the receiving computers memory.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Trojan?

A

A Trojan is a malicious program but it does not replicate itself, rather it relies on the user downloading what seems to be (and may actually be) a useful program that has the malicious functions hidden within the program. When activated it may steal data or damage the computer system. Trojans can also be used to control a computer remotely without the user’s permission

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Spyware?

A

Spyware is a piece of software that installs itself on a computer, usually without the user’s knowledge. It is used to gather personal or private information from the computer, without the user’s knowledge or permission.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Purpose of Spyware?

A

ts main purpose is to track a user’s movements on the Internet and to target the user with pop ups. Some spyware can be used for useful purposes in business: many programs exist that can monitor activity across a network to see what employees are working on or looking at on the Internet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Phishing?

A

Phishing is the attempt to acquire information like passwords or credit card details from users by pretending to be someone else, like a bank.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Keylogging?

A

Keylogging is an abbreviation of keystroke logging and it does what the name suggests - it logs the keys that are pressed on a keyboard. Usually a user will not be aware that their keystrokes are being recorded.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

How to avoid keyloggers?

A

One way to avoid software keyloggers is to install anti-spyware software, or an anti-keylogger program. You could make use of one time passwords, a technique used by some banks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

DOS attack?

A

A Denial of Service (DOS) attack is when a website or a network is targeted, with the intention of making it unavailable to users.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Types of DOS attack?

A

Physical attack, Exploitation of Software Flaws, Exploitation of Network Management Flaws, Resource starvation, Ransomware, DNS attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Encryption?

A

encoding data before it is stored / transmitted. The data must then be encrypted using the correct key before it can be understood. If data is intercepted it cannot be easily. deciphered.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Digital signatures?

A

Uses encryption methods as a way of authenticating data so that the recipient can be sure it has not been altered/tampered with.`

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Digital certificate?

A

An electronic document used to prove that the person sending data is who they claim to be, the padlock icon.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Biometrics in industry?

A

unique characteristics like fingerprint, voice recognition.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly