Unit 4 - Network security & system software Flashcards
What is malware?
Network threats
- comes from 2 words: malicious software
- executable programs that run on a computer
What are different types of malware?
Network threats
- Viruses
- Worms
- Trojans
- Ransomware
How do viruses work?
Network threats
Computer viruses infect computers by:
- replicating their code in other programs
- infecting other computers
- harming the computer by deleting,
corrupting or modifying files
How do worms work?
Network threats
- replicates itself in order
to spread to other computers - may cause no damage to the attacked computers
- slow down networks
and computers
How do computer trojans work?
Network threats
- a program, game or cracked file that user wants
- they have a negative programs code which causes damage, takes control, or provides access to the computer
How does ransomware work?
Network threats
Software which:
- holds a computer hostage by locking or encrypting access to it
- if the data is encrypted, not even a cyber security professional will be able to recover the data unless backups are available.
- the access will only be restored if the ransom is paid.
What are 2 ways hackers can exploit technical vunerabilities?
Network threats
- unpatched software
- out-of-date anti-malware
Why are unpatched software vulnerable?
Network threats
if software updates and security updates are not installed then the software will be vulnerable
Why are out-of-date anti-malware vulnerable?
Network threats
if software, such as antivirus software, isn’t regularly updated then it won’t be able to detect the latest viruses
What is social engineering?
Network threats
Social engineering is the ability to obtain confidential information by asking for it.
What is sholder surfing?
Network threats
Shoulder surfing is the ability to get information or passwords by observing as someone types them in.
What is Phising?
Network threats
Phishing is a type of social engineering technique, emails, texts or phone calls are sent to users commonly pretending to be from a bank or website.
How can phising be spotted?
Network threats
- Greeting: greeting is not personalised
- The sender’s address is often a variation on a genuine address
- Forged link: The link looks genuine, but it may not link to the website given.
- Poor spelling and grammar
- Request for personal information: Genuine organisations never do this
- Sense of urgency: Criminals try to persuade you that something bad will happen if you don’t act fast
What is a denial of service (DoS) attack?
Network threats
In a denial of service attack, a hacker will use or infect a computer so that:
- it sends as many requests to the server as it can (known as a flood)
- the server can’t respond fast enough so slows down or goes offline
What is a distributed denial of service attack (DDoS)?
Network threats
many computers are used to send the requests
What is a man-in-the-middle attack (MITM)?
Network threats
allows the attacker to intercept communications between the user and server and:
- eavesdrop to find passwords and personal information
- add different information to a web page or other communication such as email
What are some threats to digital devices?
Network threats
- losing mobile phone can lead to loss of all data in it
- malware can allow malicious users to acces device
- some apps are malicious and lead to fraudelent charges
Methods to protect mobile phone:
Network threats
- use strong password
- encrypt data
- dont follow links in sus emails
- dont install apps without researching them
- delete all info on phone before discarding
What is a brute force attack?
Network threats
In a brute force attack, a hacker will try every combination of password until the correct password is found.
What is a SQL injection and how does it work?
Network threats
uses web forms to add SQL instructions to a query that cause data loss or the revealing of personal information
What is penetration testing?
Preventing vulnerabilities
The practice of deliberately trying to find security holes in your own systems.
How does penetration testing work?
Preventing vulnerabilities
testing to:
- identify the targets of potential attacks
- identify possible entry points
- attempt to break in
- report back the findings