Unit 1.6 Flashcards
What are the different threats posed to networks for cyber-attack?
brute force denial of service data theft/interception SQL injection malware social engineering poor network policy
What is malware?
malicious software
What are the different types of malware?
Adware Spyware Virus Worm Trojan Denial-of-service attack Rootkit Keyloggers Ransomware
What is adware attack?
Malware
Adware: displays ads on your computer.
What is spyware attack?
Malware
Spyware: software that tracks your internet activities in order to send advertising (Adware) back to your system.
What is a virus?
Malware
Virus: a contagious program or code that attaches itself to another piece of software, and then reproduces itself when that software is run. Most often this is spread by sharing software or files between computers.
What is a worm?
Malware
Worm: A program that replicates itself and destroys data and files on the computer. Worms work to “eat” the system operating files and data files until the drive is empty.
What is a Trojan attack?
Malware
Trojan: seemingly harmless program, but in the background it is taking over your computer’s system resources, and in larger systems creating a “denial-of-service attack”
What is a Denial-of-service attack?
Malware
Denial-of-service attack: an attempt to make a machine or network resource unavailable to those attempting to reach it. Example: AOL, Yahoo or your business network becoming unavailable.
What is a root-kit attack?
Malware
Rootkit: runs prior to operating system starting and gives remote access to others to control your machine.
What is a keylogger attack?
Malware
Keyloggers: Records everything you type on your PC in order to learn your log-in names, passwords, and other sensitive information, and send it on to the source of the keylogging program.
What is a ransomware attack?
Malware
Ransomware: locks/encrypts your files and presents the user with a screen demanding a ransom to return the files.
What is social engineering as a form of cyber-attack?
people as a weak point in a system
What are examples of social engineering as forms of cyber-attacks?
Phishing Baiting Quid pro quo Tailgating Spear phishing
What is phishing?
Social Engineering
Phishing: communication often by email asking you to click on a link or provide details for accounts – they may have logos to look genuine, but have poor spelling and generic greeting