Week 4: Security Attacks Flashcards

1
Q

Describe Salting

A

Adding an additional string of text to a password before it is passed through a hashing algorithm. ensures each hashed value is unique, negates possibility that one compromised password becomes a security risk for another user who may have the same password since they would have the same hash value without hashing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Describe what a DDoS is

A

When traffic to a server is becomes too much for it to handle it can cause the server, service or network to go down which could happen through genuine reasons such as going viral, but it can be simulated through a distributed denial of service attack, malicious attempt to disrupt the normal traffic of a targeted server, could be done using botnets.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

technical, legal and ethical responses of DDoS attack

A

technical:
hard to track the attacker
it’s easy for anyone to do it
a response can include flexible server hosting
Legal:
if done from a foreign country it’s hard to prosecute
responsibility? computers used don’t belong to the attacker
form of protest - it’s similar to just stop oil protests
how do you measure severity
Ethical:
what if protests are against oppressive regimes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is an Advance Fee Fraud

A

When someone pays for something but isn’t guaranteed to receive it;
false listings
spam emails

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is phishing

A

Phishing involves attackers directing users to a malicious website that mimics a legitimate one, like a banking site. The goal is to trick users into entering personal information, such as login details.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is an example of how phishing disguises itself?

A

A phishing site may use a deceptive URL, such as “H5BC” instead of “HSBC,” to appear legitimate.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

How do phishing attacks reach users?

A

Phishing attempts often arrive via spam emails or SMS messages. Some well-known examples include scammers pretending to be the Royal Mail in the UK.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is spear phishing?

A

Spear phishing is a targeted attack where customized emails or code are used to impersonate a trusted source, like a company’s HR, to trick specific individuals.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Why is spear phishing harder to prevent?

A

It can bypass spam filters and antivirus protection by appearing more personalized and trustworthy.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is pharming?

A

Pharming redirects users to malicious sites by exploiting cracked DNS servers, even if the entered URL looks legitimate.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

How does HTTPS help protect against pharming?

A

HTTPS provides encryption and validation, ensuring that users connect to the intended legitimate server.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is baiting?

A

Baiting involves leaving a physical device, like a USB stick, that contains malicious software. When someone uses it, the malware executes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Why is baiting effective?

A

It exploits human curiosity or altruism, such as someone trying to return a “lost” USB stick.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is ransomware?

A

Ransomware encrypts a victim’s hard drive, making data inaccessible unless a ransom (often in cryptocurrency) is paid.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are the consequences of ransomware attacks?

A

Victims lose data permanently if they don’t pay, and they may violate data protection laws like GDPR if personal data is compromised.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is an example of a major ransomware attack?

A

WannaCry caused tens of millions of pounds in damage to the NHS in the UK due to outdated software.

17
Q

What is social engineering?

A

Social engineering manipulates people into revealing confidential information or breaking security protocols by exploiting human psychology.

18
Q

Why is social engineering effective?

A

It preys on human emotions like trust, helpfulness, and the willingness to bend rules for perceived good intentions.