Threats To Computers Flashcards

You may prefer our related Brainscape-certified flashcards:
1
Q

What is malware?

A

Malicious software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is social engineering?

A

Cybersecurity attacks which aim to steal a persons’ personal information and can delete or corrupt data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are examples of social engineering?

A

Blagging, phishing, DDOS, brute force attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is DDOS attack?

A

Denial of service which is when attackers flood a website with unnecessary traffic to make it unavailable or temporarily shut down

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is a worm?

A

A type of malware which self replicates and does not need to be attached to a program to do it and also scans the internet to look for devices to attach to.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Whats a virus?

A

A malware that spreads between devices through attaching to programs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is the story of the trojan horse?

A

The trojans left a horse with resources in a very public area and the acheans were very happy and celebrated and during night the trojans jumped out from the horse and raided the city.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is a trojan horse virus?

A

A virus that disguises itself as a legitimate program.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is data interception?

A

When an attacker gathers/records and sends back data between two parties without their knowledge.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are the different types of malware?

A

• social engineering
• viruses
• worms
•ransomware
• adware
• trojan ware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is an SQL injection?

A

When an attacker injects a networks’/ databases’ SQL statements with malicious code which allows them to extract or delete any data and manipulate data however they want.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is a botnet?

A

A network of private computers infected with malicious software and controlled without owners’ knowledge

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Whats penetration testing

A

A test where a cyber security expert attempts to find vulnerabilities in a computer system for further improvements.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are methods of penetration testing?

A

White box testing
Black box testing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

How are people the biggest threat

A

They do not adhere/ oblige with the network policies and can accidentally or intentionally break rules

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

How do attackers trick people?

A

They use fear to threaten them

17
Q

Whats encryption?

A

Hidden content which can only be accessed with encryption key and is plain text turned into cypher text and other people can not see it.

18
Q

What are user access levels?

A

The permissions given to a user to access facilities on a computer

19
Q

What is a network policy

A

Rules put in place to tell users of the network how to use it and what not to do:

20
Q

Whats a firewall?

A

An application that prevents unauthorised access to and from the internet.

21
Q

Whats network forensics

A

Prevenative measure which monitors traffic on a network

22
Q

What scareware?

A

A cyberattack tactic which scares people into visiting infected websites or downloading malicious software.
- can come up as pop up ads
- can appear as smam mail

23
Q

Whats a rootkit
?

A

A software used by cybercriminals to gain control over a target computer/network.
- usually made up of a collection of tools

24
Q

Whats adware?

A

Displays unwanted pop up adverts often in the form of pop ups and sells your data to third parties.

25
Q

Whats spyware

A

Malware which gathers data from device and user and sends to third parties consent.

26
Q

Whats a keylogger?

A

A computer program which records every keystroke made by a computer user to gain access to passwords

27
Q

Whats physical security

A

The most basic level of security/ restricting physical access to parts of a network such as
• lock the computer room when not in use
• restrict USB ports and floppy disks cuz theyre easy to attack
• install surveillance cameras
• backup discs are secured and locked

28
Q

Whats whitebox testing

A
29
Q

Whats blackbox testing

A