Unit 1 - 4 Flashcards

1
Q

What is indirect access?

A

An approach which involves manipulating the victim in order to gain access and control over an online system. A TYPE OF SOCIAL ENGINEERING

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Why do people hack and use indirect access to do so?

A

To gain access in order to steal personal data and in many cases financial information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Give examples of social engineering?

A

Baiting - attacks that use a false promise to depict a victim’s greed or curiosity.
Phishing - when criminals use scam emails, text messages or phone calls to trick their victims.
Scareware - involves victims being bombarded with false alarms and threats.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Give the examples of direct threat attacks?

A

Malware, Brute-force, Denial of service, SQL injection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is data interception? (Indirect access)

A

A form of eavesdropping as users are unaware that their data is being extracted, all data moving across the internet or IP network does so in the form of data packets so those data packets may be intercepted. These packets can contain personal information such as passwords is extracted by copied packets. Types can be targeted or bulk.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is Malware? (Direct threat)

A

General term to suggest a hostile or software that has infected your device, it might disrupt the efficiency of device or secretly monitor wa you are doing for future reference for e.g. passwords. Spyware does this, viruses disrupt computers operations and efficiency

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is Brute-force (Direct threat)

A

An approach to guess a password through a computer program that is written to go through every possible combination until the correct one is found, difficulty is dependant on how efficient the password is, character length and variety of characters and symbols

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is denial of service (DOS) (Direct threat)?

A

A method of preventing legitimate users from connecting to a certain server, website and mainline networks can be blocked to clop the CPU and memory expenditure to gain access and block user access to networks, types HTTP Flood, UDP flood

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is SQL injection (Direct threat)?

A

Deliberate addition of malicious SQL code into a form of a web where it is able to view and acess databases, aim to gain access to confidential information through a database attack. SQL = Structured query language. Types of SQL include Error-bases, UNION, Out of band

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is prevention?

A

Techniques used to ensure a network is safe from any attacks or threats

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Give the 7 examples of preventions?

A

Anti-malware software, Firewalls, User access levels, passwords, encryption, physical security, penetration testing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is anti-malware software (prevention)?

A

Prevents malware, it is a database that looks for typical virus behaviour and is downloaded and uploaded on a daily basis, types include bitdefender, ransomware protection, malwarebytes free

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is a firewall (prevention)?

A

Set of rules in which data packets can enter a live network and come in forms of both hardware or software to block certain IP addresses and servers especially gaming servers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is user access levels (prevention)?

A

St up by network manager to manage access rights and allocate different groups and accounts to prevent unwanted access to personal data and files, different levels of access can be granted which determine applied actions. 3 Levels include, READ - WRITE - EXECUTE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is passwords (prevention)?

A

Best possible way to defend cyber attacks and remain on a safe network, brute force attacks try crack them so having a strong password with a variety of characters and symbols which is relatively long and does not repeat is the best

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is encryption (prevention)?

A

Process if scrambling a message or data in a way that only the user or computer knows the correct key to the file and data, the key is often a very large generated number that prevents cyber attacks and is disguised as cipher text. 2 TYPES - SYMMETRIC AND ASYMMETRIC

17
Q

What is physical security (prevention)?

A

A void direct vulnerability and simply make it difficult for unauthorised users getting access to servers or computers including CCTV cameras, Security staff, Security cards and external fencing/alarms

18
Q

What is penetration testing (prevention)?

A

Prevents unwanted access to device and detects entry before further damage and cyber infections are developed, hired professionals called ‘penetrators’ test and locate where weaknesses are in the network and where a cyber attack to take place and further spread and gain access into the entire network