1.4.3 Online Security and Attacks Flashcards

1
Q

What is a virus?

A
  • A virus is a program or piece of software
  • It is a program that copies itself …
    • … in order to damage or destroy files files
  • Often causes the computer to crash
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

How can I protect myself from a virus?

A
  • Install anti-virus software
  • Don’t use software from uknown sources
  • Be careful when opening attachments
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What does antivirus software do?

A
  • Scans files for virus
  • Also checks data before it is downloaded
  • Can constantly run in the background
  • Can run scheduled scans
  • Automatically updates virus definitions
  • Can quarantine or delete a virus
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is a Spyware?

A
  • Spyware is a program or piece of software
  • It records the key presses on the users keyboard …
    • … and sendsback the key presses to the creator
  • Data can be analysed to find user passwords
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

How can I protect myself from spyware?

A
  • Install anti-spyware software
  • Input random characters (of a password)
  • Use drop down menus (instead of key presses)
  • Generate time sensitive pins that change regularly
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What does anti spyware software do?

A
  • Finds and removes spyware installed on a computer
  • Stops the recording of key presses …
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is a Hacking?

A
  • The act of gaining illegal access to a computer system …
    • …without the owners consent or knowledge
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

How can I protect myself from hacking?

A
  • Install anti-hacking software
  • Use firewalls
  • Use strong passwords
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are the consequences of hacking?

A
  • Can lead to identity theft
  • Can lead to the loss of personal information
  • Data can be deleted, changed or corrupted
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is a hacker?

A

A person who tries to gain illegal access to a computer or a network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is a cracker?

A

Someone who edits program source code usually for a malicious purpose

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is cracking?

A

The act of illegally changing the source code of a program so that it can be exploited for another use

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Explain what is meant by a DOS attack

A
  • Denial of Service (DoS) attack
  • A large number of requests are sent to the network or server all at the same tim
  • Designed to flood a network/server with useless traffic/requests
  • The network/server will come to a halt trying to deal with all the traffic/requests
  • Prevents users from gaining access to a website/server
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are the signs of a DOS attack?

A
  • Slow network performance e.g. accessing websites
  • Unable to access particular websites or files
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

How can you prevent a DOS attack?

A
  • Using an up-to-date malware/virus checker
  • Setting up a firewalls to restrict traffic to a server
  • Applying email filters to manage unwanted spam.
  • Be careful when opening attachments
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is a Phishing?

A
  • Creator sends a legitimate looking email
  • User then clinks on a link and they are sent to a fake website
17
Q

How can I protect myself from phishing?

A
  • ISP’s can filter out phishing emails
  • Don’t click on links
  • Look out for spelling errors
  • Look out for lack of personalisation e.g. Dear customer
  • Check the URL (link) is correct
18
Q

What are the consequences of pharming?

A
  • Steals personal data when user enters details
  • This leads to fraud or theft
19
Q

What are the consequences of phishing?

A
  • Steals personal data when user enters details
  • This leads to fraud or theft
20
Q

What is a Pharming?

A
  • Malicious code installed on a computer or web server
  • Code redirects the user to a fake website
  • Hacker can change IP address on the DNS server
21
Q

How can I protect myself from Pharming?

A
  • Install anti-spyware/virus software
  • Check the URL of any links you click on
22
Q

What is a Wardriving?

A
  • Locating and using wifi connections illegally
  • Equipment needed is a …
    • Laptop
    • Wireless Network Card
    • Antenna to pick up wireless signals
23
Q

How can I protect myself from Wardriving?

A
  • Use of WEP encryption
  • Strong password protection for router
  • Use of firewall to prevent outside access
24
Q

What are the consequences of wardriving?

A
  • Steals a users download/data allowance
  • Can access wireless network to steal personal data
25
Q

What is a SPAM?

A
  • Junk/ unsolicited email
  • Sent to large numbers of people
26
Q

How can I prevent SPAM?

A
  • Use a spam filter
  • Do not give out your email address
  • Keep an eye out for tick boxes when signing up
27
Q

What is SPAM used for?

A
  • Advertising
  • Spreading malware