Weekend Revision (Chapter 5 - Paper 1) Flashcards
What is malware?
Software written to infect computers and commit crimes
What are some examples of malware?
Trojans, Viruses, Worms, Ransomware, Spyware and adware
What is phishing?
Phishing is a form of social engineering where computer users are tricked into giving away personal information.
What information do phishers aim to get?
Usernames, Passwords, credit card details
How do most people fall for phishing?
The perpetrators are usually disguised as a big legitimate company to gain your trust.
What is a brute force attack?
Trial and error method used via a computer program to decode encrypted data where the program guesses every possible passcode.
What is a DoS Attack?
Denial of Service, flood a server with useless traffic, causing it to become overloaded and unavailable. Many DoS attacks exploit limitations in the TCP/IP stack.
What is data interception?
Attackers use a technique known as network sniffing which is monitoring traffic on a network to pick out unencrypted passwords and configuration information.
What is data interception?
Attackers use a technique known as network sniffing which is monitoring traffic on a network to pick out unencrypted passwords and configuration information.
What are SQL injections?
Code injection technique used to attack data-driven applications. SQL injection makes use of vulnerabilities in poorly coded database applications. Code can be entered into text boxes and is then executed by the server.
What are the effects of malware?
Deleting corrupting and encrypting files, slowing down or causing systems to crash, reducing internet connection speeds.
How can system vunerabilities be caused by people being careless?
Not installing system updates Not keeping anti-malware up to date Not locking doors or computer rooms Sharing passwords Not encrypting data.
How do you prevent against a Brute force attack?
Network lockout policy - accounts lock out after a certain number of failed login attempts.
Progressive delays
Staff training around effective passwords with symbols and unique characters,
How do you prevent against a Brute force attack?
Network lockout policy - accounts lock out after a certain number of failed login attempts.
Progressive delays
Staff training around effective passwords with symbols and unique characters,
How can you prevent against a DoS attack?
Strong firewall
Packet filters
Web server configuration
Auditing, logging and monitoring systems.