1
Q

What are the different threats posed to networks for cyber-attack?

A
brute force
denial of service
data theft/interception
SQL injection
malware
social engineering
poor network policy
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is malware?

A

malicious software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are the different types of malware?

A
Adware
Spyware
Virus
Worm
Trojan
Denial-of-service attack
Rootkit
Keyloggers
Ransomware
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is adware attack?

A

Malware

Adware: displays ads on your computer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is spyware attack?

A

Malware

Spyware: software that tracks your internet activities in order to send advertising (Adware) back to your system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is a virus?

A

Malware
Virus: a contagious program or code that attaches itself to another piece of software, and then reproduces itself when that software is run. Most often this is spread by sharing software or files between computers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is a worm?

A

Malware
Worm: A program that replicates itself and destroys data and files on the computer. Worms work to “eat” the system operating files and data files until the drive is empty.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is a Trojan attack?

A

Malware
Trojan: seemingly harmless program, but in the background it is taking over your computer’s system resources, and in larger systems creating a “denial-of-service attack”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is a Denial-of-service attack?

A

Malware
Denial-of-service attack: an attempt to make a machine or network resource unavailable to those attempting to reach it. Example: AOL, Yahoo or your business network becoming unavailable.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is a root-kit attack?

A

Malware

Rootkit: runs prior to operating system starting and gives remote access to others to control your machine.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is a keylogger attack?

A

Malware
Keyloggers: Records everything you type on your PC in order to learn your log-in names, passwords, and other sensitive information, and send it on to the source of the keylogging program.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is a ransomware attack?

A

Malware

Ransomware: locks/encrypts your files and presents the user with a screen demanding a ransom to return the files.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is social engineering as a form of cyber-attack?

A

people as a weak point in a system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are examples of social engineering as forms of cyber-attacks?

A
Phishing
Baiting
Quid pro quo
Tailgating
Spear phishing
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is phishing?

A

Social Engineering
Phishing: communication often by email asking you to click on a link or provide details for accounts – they may have logos to look genuine, but have poor spelling and generic greeting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is baiting?

A

Social Engineering
Baiting: leaving infected devices (memory stick, DVD) to be found, often with interesting labels (“salary information”), in the hope that people will be tempted to plug them into a pc

17
Q

What is quid pro quo?

A

Social Engineering

Quid pro quo: when someone offers a gift or a bribe in return for log in details to a system

18
Q

What is a tailgating attack?

A

Social Engineering

Tailgating: physical social engineering, standing closely behind someone as they enter a restricted area

19
Q

What is spear phising?

A

Social Engineering
Spear phishing: a targeted phishing attack where specific details are known about the person and are used in the communication to make it more believable