T4 - Network threats Flashcards

1
Q

Prevention methods for malware

A
  • Anti-malware, anti-virus (both are the same thing, in OCR only put one of these down not both or you will only get one mark instead of two)
    -encryption
    -user access levels
    -firewall
    -backup / recovery procedures
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is Malware:

A

are executable programs that run on a computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Key info about Computer virus:

A

replicate their code in other programs
infect other computers
harm the computer by deleting, corrupting or modifying files

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Key info about Worms:

A

replicates itself in order to spread to other computers
They might cause no damage to the attacked computers
They slow down networks and computers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Key info about Trojan horses:

A

They have a program, game or cracked file which is something the user wants
They have negative program code which causes damage, takes control, or provides access to the computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Key info about Ransomware:

A

Holds a computer hostage by locking or encrypting access to it
If the data is encrypted, not even a cyber security professional will be able to recover the data unless backups are available
Once a ransom is paid to the attacker, access is restored

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

eg of malware

A

-virus
-worms
-trojan horse
-ransomware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Unpatched software

A

– if software and security updates are not installed then the software will be vulnerable to attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Out-of-date anti-malware

A

– if software, such as anti-virus software, isn’t regularly updated then it won’t be able to detect the latest viruses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Social engineering

A
  • the ability to obtain confidential information by asking people for it
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Shoulder surfing

A
  • the ability to get information or passwords by observing as someone types them in
    -Looking over someone’s shoulder
    -Using a CCTV camera
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Phishing -

A

Emails, texts or phone calls are sent to users commonly pretending to be from a bank or website
Email will be forged
Try to obtain = Usernames, Passwords, Credit cards details

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What to look out for for phishing:

A

for OCR you only need to know 4 of these
- un-personalised greeting
- The sender’s address
- Forged link
- Request for personal information
- Sense of urgency
- Poor spelling and grammar

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What to look out for for phishing: greeting

A

The phishers don’t know your name – just your email address, so the greeting is not personalised

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What to look out for for phishing: - The sender’s address

A

is often a variation of a genuine address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Denial of service:

A

a hacker will use or infect a computer so that:
it sends as many requests to the server as it can (known as a flood)
the server can’t respond fast enough so slows down or goes offline

17
Q

A man-in-the-middle attack (MITM):

A

allows the attacker to intercept communications between the user and server.

18
Q

Man in the middle attack allows attacker to do what when hacked

A

The attacker can then:
eavesdrop to find passwords and personal information
add different information to a web page or other communication such as email

19
Q

What to look out for for phishing: Forged link:

A

The link looks genuine, but it may not link to the website given.

20
Q

What to look out for for phishing: sense of urgency

A

Criminals try to persuade you that something bad will happen if you don’t act fast

21
Q

example of usb with malware in a workplace

A

Criminals sometimes leave a USB stick containing malware in a public place such as a company car park
An unsuspecting employee may pick it up and insert it into their computer
The malware can now install onto the computer so that a hacker can gain access to files, personal data and system resources

22
Q

In a brute force attack:

A

a hacker will try every combination of password until the correct password is found

23
Q

SQL injection = Structured Query Language :

A

is a database query language
takes advantage of web input forms to access or destroy data
commands can be input into web forms instead of the expected ‘real’ data
interpreted by vulnerable web applications and end up causing damage or releasing personal information

23
Q

SQL injection stands for

A

= Structured Query Language :