Weekend Revision (Chapter 5 - Paper 1) Flashcards
What is malware?
Software written to infect computers and commit crimes
What are some examples of malware?
Trojans, Viruses, Worms, Ransomware, Spyware and adware
What is phishing?
Phishing is a form of social engineering where computer users are tricked into giving away personal information.
What information do phishers aim to get?
Usernames, Passwords, credit card details
How do most people fall for phishing?
The perpetrators are usually disguised as a big legitimate company to gain your trust.
What is a brute force attack?
Trial and error method used via a computer program to decode encrypted data where the program guesses every possible passcode.
What is a DoS Attack?
Denial of Service, flood a server with useless traffic, causing it to become overloaded and unavailable. Many DoS attacks exploit limitations in the TCP/IP stack.
What is data interception?
Attackers use a technique known as network sniffing which is monitoring traffic on a network to pick out unencrypted passwords and configuration information.
What is data interception?
Attackers use a technique known as network sniffing which is monitoring traffic on a network to pick out unencrypted passwords and configuration information.
What are SQL injections?
Code injection technique used to attack data-driven applications. SQL injection makes use of vulnerabilities in poorly coded database applications. Code can be entered into text boxes and is then executed by the server.
What are the effects of malware?
Deleting corrupting and encrypting files, slowing down or causing systems to crash, reducing internet connection speeds.
How can system vunerabilities be caused by people being careless?
Not installing system updates Not keeping anti-malware up to date Not locking doors or computer rooms Sharing passwords Not encrypting data.
How do you prevent against a Brute force attack?
Network lockout policy - accounts lock out after a certain number of failed login attempts.
Progressive delays
Staff training around effective passwords with symbols and unique characters,
How do you prevent against a Brute force attack?
Network lockout policy - accounts lock out after a certain number of failed login attempts.
Progressive delays
Staff training around effective passwords with symbols and unique characters,
How can you prevent against a DoS attack?
Strong firewall
Packet filters
Web server configuration
Auditing, logging and monitoring systems.
How to prevent data interception?
Encryption
Virtual networks
What are some common prevention methods?
Penetration testing Anti malware Firewall User Access Levels Passwords Encryption Physical Security
What is the application software?
Managed by OS, user interacts with the system via the user interface which is provided by the OS
What do utility programs provide?
Extra functionality to the OS.
What does file management do?
Allows you to name files, set things in folders, user access levels.
What do device drivers do?
Allow 3rd party hardware to communicate with operating system.
What are the key features of a GUI?
Windows, icons , menus, pointers Visual Interactive Intuitive Optimised for mouse and touch gesture input.
What is CLI?
Text based and less resource intensive than GUI’s, input more commands than GUI’s and it is highly efficient.
What is a menu user interface?
Successive menus are presented to the user
single options chosen at each stage
often with buttons on a keypad