Threats to Data, Info & Systems Flashcards

1
Q

What is malware?

A

Malware is malicious software designed to harm or gain unauthorized access to a computer system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the different types of malware?

A

The different types of malware include viruses, worms, Trojans, and spyware.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is a virus?

A

A virus is a type of malware that copies and inserts itself into programs running on your computer system. It spreads when the programs or data files it is attached to are passed to another system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is a worm?

A

A worm is a type of malware that is similar to a virus but does not need to attach itself to other programs. It spreads through tunnelling through a network and exploiting security holes in systems to gain access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is a Trojan?

A

A Trojan is a harmful program that masquerades as a legitimate software application. It spreads by users downloading it thinking it is a program they want, but it hides a harmful payload. It doesn’t self-replicate like worms and viruses.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is spyware?

A

Spyware is a malicious program that monitors user activity for the purpose of stealing personal information. An example would be a keylogger that records every keystroke a user makes and sends it back to a malicious user. This is commonly spread as part of a Trojan.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

How can malware impact individuals and organizations?

A

Malware can corrupt or delete data being stored on IT systems, causing inconvenience and potential loss of important information. Spyware can also be used to gather personal data for the purpose of stealing money or committing identity fraud.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is a hacker?

A

A hacker is someone who gains unauthorized access to a computer system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is a brute force attack?

A

A brute force attack is a type of hacking where a program automatically goes through a list of common passwords until it eventually guesses the correct password and gains access to the computer system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is a white hat hacker?

A

A white hat hacker is someone who tests systems for security flaws by attempting to gain access in order to help check the security procedures of an organization. They may even be paid bounties for detecting security flaws in software and reporting them to the organization that developed the software.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

How can hacking impact individuals and organizations?

A

Hacking can result in unauthorized access to an organization’s or individual’s data, which can be used to steal financial information or commit identity fraud. Hackers could also use private and confidential data for blackmail purposes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is phishing?

A

Phishing is a type of attack where emails are sent pretending to be from a reputable company in order to gain personal or financial information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

How does phishing work?

A

A phishing email will appear to be from a reputable business and will usually contain a link that appears to be for their website. However, when clicked on it will take the user to another website that is designed to look like the business’ but is not. This website will contain a form to be filled out with personal data and when submitted will go to the malicious user.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is phone phishing?

A

Phone phishing is where people phone users claiming to be from a legitimate business in order to gain personal and financial information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

How can phishing impact individuals and organizations?

A

The goal of phishing is usually to obtain personal and financial information, which can be used for stealing money or committing identity fraud. The data stolen from organizations through a phishing email could also be used to perform a hack on the organization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is accidental damage?

A

Accidental damage refers to damage to an IT system that is not malicious but caused by human error.

17
Q

What are some examples of accidental damage?

A

Some examples of accidental damage include dropping laptops, tablets, or smartphones; spilling liquids on IT systems; misplacing external storage devices or devices; and accidentally deleting or overwriting files or folders.

18
Q

How can accidental damage impact individuals and organizations?

A

Accidental damage can result in the loss of important data, which can be expensive to recover from. Individuals may lose data with emotional value, while organizations may lose important business data. Additionally, lost or damaged devices may need to be replaced, which can be costly.