Week 3: Flashcards
Inline CSS
Inline CSS:
Inline CSS contains the CSS property in the body section attached with element is known as inline CSS. This kind of style is specified within an HTML tag using the style attribute
Internal CSS
This can be used when a single HTML document must be styled uniquely. The CSS rule set should be within the HTML file in the head section i.e the CSS is embedded within the HTML file.
External CSS:
External CSS contains separate CSS file which contains only style property with the help of tag attributes (For example class, id, heading, … etc). CSS property written in a separate file with .css extension and should be linked to the HTML document usinglink
tag. This means that for each element, style can be set only once and that will be applied across web pages.
What is a cyberattack?
any offensive manuever that targets information systems, networks, infrastructures and personal devices.
Attacker
can be a person or process that attempts to access data, functions or other restricted areas of the system withoUt authorization. Potentially with malicious intent.
Cyberattacks range
- Cyberattacks can range from installing spyware on a personal computer to attempting to destroy the infrasture of entire nations
types of Cyberattacks
Physical security threat
password attack
social engineering
spoofing
Man in the middle attack
malware (and malicious mobile apps)
Physical attack?
When your stuff is PHYSICALL stolen
Protecting from a physical cyber attack?
- How to stay safe?
- encrypted hard drives, USBs
- Never write passwords on post-its
- never leave system unattended, unlocked and unattended (phones too) _
- have proper backup and remote wipes services
Password attack
Password Attack:
- hackers can use programs to create/try millions of passwords in seconds
- brute force - try with all combinations of characters/number/symbols
- dictionary words: try all possible combinations of basic words
- credential stuffing: try various combinations of previous compromised passwords
Multifactor authentification process
requires TWO different aspects of credentials from the
types of credentials
- Biometric (fingerprints, facial ID)
- Something you know (mot de pass, or pin)
- Something you have - another device, smartphone, email address, smart card)
Social engineering attack:
psychological manipulation of people into performing actions or divulging confidential information. *eg. bank account, ssn, financial info.
Main properties:
- Disguise/misrepresentation (spoofing)
- Often creates a sense of urgency - Person must do something or accounts will be shut down
- Comes in many forms: Phishing, smishing, vising, baiting, tailgating
Phishing (most common attack)
- attacker sends a MESSAGE designed to trick a human victim to
- reveal info to the attacker
- clicks on links or open attachments that install ransomware
- direct you to fake websites to reset password
Spoofing
In the context of information security, and especially network security, a spoofing attack is a situation in which a person or program successfully identifies as another by falsifying data, to gain an illegitimate advantage