Threats to networks * Flashcards

1
Q

What is an active form of attack?

A

where the hacker attempts to modify or delete data, or prevent a network from operating properly

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is eavesdropping?

A

where the hacker monitors a network in order to gain information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is an external form of attack?

A

where someone outside of an organisation attempts to hack its network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is an internal form of attack?

A

where someone within an organisation attempts to hack its network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

List the 6 techniques used to hack a network

A
  • malware
  • phishing
  • brute force
  • denial of service
  • data interception and theft
  • SQL injection (Structured Query Language)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is malware?

A

a malicious software that is designed to hack a system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are the 5 types of malware?

A
  • viruses
  • worms
  • trojans
  • spyware
  • ransomeware
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Malware

What are viruses? (2 points)

How do they harm a network?

A

programs hidden within other files
they replicate themselves and become part of other programs

delete or modify data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Malware

What are worms?

How are they often spread?

A

programs similar to viruses except they aren’t hidden within other files

often spread through emails

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Malware

What are trojans?

What do they do instead of replicating?

A

programs which pretend to be legitimate and are often disguised in email attachments

trojans can’t replicate themselves, but trick user into installing the program

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Malware

What is spyware?

A

programs that monitor user activities and send the information back to a hacker

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Malware

What is ransomware?

A

programs that attempt to blackmail a user into making a payment to a hacker

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Malware

What are botnets?

A

a network of infected computers all under the control of a hacker

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is phishing?

A

emails that trick users into giving away personal details
eg. convincing them into putting their details into a fake bank account website

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is brute force?

A

a program is used to find a password by trying all the possible combinations until one is correct

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What can a hacker do using a brute force attack?

A
  • hack into websites
  • deface websites
  • crash servers
  • email spam to millions of users
  • steal your personal information
17
Q

What are the three types of brute force attack?

A
  • dictionary attack - use list of common words and phrases
  • password spraying - common passwords, large numbers of computers at once
  • botnets - control multiple computers at once
18
Q

What is denial of service (DOS)?

A

where a computer (or many computers) are used to prevent a server from performing its tasks
bombards server over and over with requests, until server is occupied trying to handle fake requests and doesn’t answer legitimate ones

19
Q

What is data interception?

A

where data is intercepted during transmission
done using software called packet sniffer, which examines packets as they are sent around a network or across the internet
information gathered and sent back to hacker

20
Q

What information can be obtained through data interception?

A
  • payment data (eg. bank details)
  • passwords and personal details to hack into accounts and sell to third parties for identity theft
21
Q

What is SQL?

A

Structured Query Language

an SQL code is entered as a data input
cause errors or unintended operations

22
Q

What can hackers do using an SQL injection? (4 things)

A
  • steal credentials
  • access databases
  • alter data
  • delete data