Topic 6 - Cyber Security Flashcards
What are the 4 types of attacks ?
Active attack
Social engineering
Passive attack insider attack
What is an active attack ?
When someone uses malware or other technical methods to compromise a network’s security
What is social engineering?
When a person is exploited into giving away critical information that gives access to the network or accounts.
What is a passive attack ?
When a hacker eavesdrops on a network by ‘sniffing’ the data packets
What is an insider attack ?
When someone in an organisation gives away access details or sensitive information.
What is the name for any methods which allow users to prove that an account is theirs ?
Authentication
What is the most common authentication method ?
The most common authentication method is using a password.
Why do many hackers want to find people’s passwords ?
so that they can gain access to accounts:
What is Finding people’s passwords called ?
cracking the password
What is a brute force attack ?
A brute force attack tries to crack a password by trying every single combination of letters and numbers until the correct one is found
What is the problem with a brute force attack ?
This can take a very long time, although special software is used to do this which makes it possible to make millions of attempts per second
What is a dictionary attack ?
A quicker form of the brute force attack is the dictionary attack.
Rather than attempting every single combination, a dictionary attack tries words from a predetermined list:
A common dictionary to use would be a list of common passwords.
What are three ways to protect against password cracking ?
Writing a network policy which enforces strong passwords can protect against dictionary attacks.
Using two-factor authentication can prevent the hacker from logging in, even if they have the password.
Restricting the number of failed password attempts before an account is ‘locked’ for a fixed period of time can deter hackers.
How do denial of service (DoS) attacks work ?
A denial of service (DoS) attack tries to bring down a server by flooding it with many useless requests.
The attack aims to overload the server. This stops the server responding to legitimate requests
What can be used to protect a server from a DoS attack ?
A fire wall