Security Threats Flashcards

1
Q

What is malware?

A
  • Any type of harmful program that seeks to damage or gain unauthorised access to your computer system.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Virus:

A
  • Can replicate itself and spread from system to system by attaching itself to infected files.
  • A virus is only activated when opened by a human.
  • Once activated, a virus can change data or corrupt a system so that it stops working.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Worm:

A
  • Can replicate itself and spread from system to system by finding weaknesses in software.
  • Does not need an infected file or human interaction to spread.
  • Spreads very quickly across a network once it has infiltrated it.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Trojan:

A
  • Harmful program that looks like legitimate software so users are tricked into installing it.
  • A Trojan secretly gives the attacker back door access to the system.
  • Do not self replicate or infect other files.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Spyware:

A
  • Secretly records the activities of a user on a computer.
  • The main aim of spyware is to record usernames, passwords and credit card information.
  • All recorded information is secretly passed back to the attacker to use.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Keylogger:

A
  • Secretly records the key presses of a user on a computer. Data is stored or sent back to the attacker.
  • It records usernames, passwords and credit card information.
  • Can be downloaded or plugged into the USB port.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Ransomware:

A
  • Locks files on a computer system using encryption so that a user can no longer access them.
  • The attacker demands money from the victim to decrypt the data.
  • Attackers usually use digital currencies like bitcoin which makes it hard to trace them.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

SQL Injection:

A
  • A SQL Injection is when a malicious SQL query is entered into a data input box on a website.
  • The SQL query can trick the website into giving unauthorised access to the website’s database.
  • Can be used to view and edit the contents of a database or even gain administrator privileges.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is SQL?

A
  • SQL is a programming language used for manipulating data in databases.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

DoS Attack:

A
  • When a computer repeatedly sends requests to a server to overload the system.
  • A server overload will slow the system and may take websites offline temporarily.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

DDoS Attack:

A
  • A coordinated attack using a botnet of infected systems to overload a server with requests.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is a botnet?

A
  • A large group of devices controlled and used maliciously by an attacker.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Brute-Force Attack:

A
  • Every possible combination tested in order from start to finish.
  • Not quick, but should break the password eventually.
  • Can be sped up if multiple computer systems are used at the same time.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Social Engineering:

A
  • Trick others into revealing their personal data by posing as a trusted source.
  • e.g impersonating an IT Technician of a school via email and asking for a student’s username and password.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Interception:

A
  • When data packets on a network are intercepted by a third party (e.g hacker) and copied to a different location than the intended destination.
  • Software called packet sniffers are used to intercept and analyse data packets.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly