Threats To Computers Flashcards
What is malware?
Malicious software
What is social engineering?
Cybersecurity attacks which aim to steal a persons’ personal information and can delete or corrupt data
What are examples of social engineering?
Blagging, phishing, DDOS, brute force attacks
What is DDOS attack?
Denial of service which is when attackers flood a website with unnecessary traffic to make it unavailable or temporarily shut down
What is a worm?
A type of malware which self replicates and does not need to be attached to a program to do it and also scans the internet to look for devices to attach to.
Whats a virus?
A malware that spreads between devices through attaching to programs.
What is the story of the trojan horse?
The trojans left a horse with resources in a very public area and the acheans were very happy and celebrated and during night the trojans jumped out from the horse and raided the city.
What is a trojan horse virus?
A virus that disguises itself as a legitimate program.
What is data interception?
When an attacker gathers/records and sends back data between two parties without their knowledge.
What are the different types of malware?
• social engineering
• viruses
• worms
•ransomware
• adware
• trojan ware
What is an SQL injection?
When an attacker injects a networks’/ databases’ SQL statements with malicious code which allows them to extract or delete any data and manipulate data however they want.
What is a botnet?
A network of private computers infected with malicious software and controlled without owners’ knowledge
Whats penetration testing
A test where a cyber security expert attempts to find vulnerabilities in a computer system for further improvements.
What are methods of penetration testing?
White box testing
Black box testing
How are people the biggest threat
They do not adhere/ oblige with the network policies and can accidentally or intentionally break rules
How do attackers trick people?
They use fear to threaten them
Whats encryption?
Hidden content which can only be accessed with encryption key and is plain text turned into cypher text and other people can not see it.
What are user access levels?
The permissions given to a user to access facilities on a computer
What is a network policy
Rules put in place to tell users of the network how to use it and what not to do:
Whats a firewall?
An application that prevents unauthorised access to and from the internet.
Whats network forensics
Prevenative measure which monitors traffic on a network
What scareware?
A cyberattack tactic which scares people into visiting infected websites or downloading malicious software.
- can come up as pop up ads
- can appear as smam mail
Whats a rootkit
?
A software used by cybercriminals to gain control over a target computer/network.
- usually made up of a collection of tools
Whats adware?
Displays unwanted pop up adverts often in the form of pop ups and sells your data to third parties.
Whats spyware
Malware which gathers data from device and user and sends to third parties consent.
Whats a keylogger?
A computer program which records every keystroke made by a computer user to gain access to passwords
Whats physical security
The most basic level of security/ restricting physical access to parts of a network such as
• lock the computer room when not in use
• restrict USB ports and floppy disks cuz theyre easy to attack
• install surveillance cameras
• backup discs are secured and locked
Whats whitebox testing
Whats blackbox testing