Test 1 Flash Flashcards
What is a Virus?
A program that self replicates
What is an Anti-Virus?
A list known viruses that protects your computer from these virus and should be updated always
What are the two ways to avoid virus?
Policies
Anti-Virus
What is a Trojan?
A Trojan horse is a program that looks benign but has malicious purpose
Buffer Overflow
is an anomaly where a program, while writing data to a buffer, overruns the buffer’s boundary and overwrites adjacent memory locations
What is Spyware?
Spyware is simply software that literally spies on what you do on your computer
What is Spyware used for?
Keyloggers
Spying through webcam
Legal Privacy concerns with employees
What is spam?
Spam is email that is sent out to multiple parties, that is unsolicited
What are the 6 common techniques used by hackers?
Data Collection Passive Active Port Scanning Packet Sniffer SQL Injection
What is Passive Scanning that a hacker does?
passive scanning is just looking at available information to the public so they don’t see that you are looking at them
What is Active Scanning?
Active scans are far more reliable then passive but may be detected by the target system
What is port scanning?
Port Scanning is the process of attempting to contact each network port on the target system and see which ones are open.
What are the two most used quotes in class?
1) “If it sounds to good to be true, it probably is!”
2) “Don’t trust anyone!”
What is a SQL Script Injection?
This attack is based on passing structured query language commands to a web application and getting the website to execute them.
What is a handshake?
This combines the elements of SYN, SYN+ACK and ACK…(three-way handshake)
1) Client sends a packet with the SYN flag
2) Server allocates resources for the client and then responds with the SYN and ACK flags set.
3) Client responds with the ACK flag set.
SYN ?
Synchronize - This packet is asking the target server to please synchronize communications.
Cyber Stalking?
Any use of electronic communications to stalk a person.
What are the two most used quotes in class?
1) “If it sounds to good to be true, it probably is!”
2) “Don’t trust anyone!”
What is a SQL Script Injection?
This attack is based on passing structured query language commands to a web application and getting the website to execute them.
What is a packet sniffer?
A program that captures data as it travels across a network.
What is data collection?
If you collect data from multiple sources you can combine and use for identity theft.
DOS - Strengths and weaknesses?
1) Strength = easy to perform, do not require a great deal of sophistication on the part of perpetrator, and can have devastating effects on the target system.
2) Weaknesses = you need a really fast computer or many computers to overwhelm another computer, website, or network. (performing DDOS - distributed denial of service)