5.3 Cyber Security Threats Flashcards

1
Q

What is a virus?

A
  • A virus is a program or piece of software
  • It is a program that copies itself …
    • … in order to damage or destroy files files
  • Often causes the computer to crash
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

How can I protect myself from a virus?

A
  • Install anti-virus software
  • Don’t use software from uknown sources
  • Be careful when opening attachments
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What does antivirus software do?

A
  • Scans files for virus
  • Also checks data before it is downloaded
  • Can constantly run in the background
  • Can run scheduled scans
  • Automatically updates virus definitions
  • Can quarantine or delete a virus
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is a Spyware?

A
  • Spyware is a program or piece of software
  • It records the key presses on the users keyboard …
    • … and sendsback the key presses to the creator
  • Data can be analysed to find user passwords
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

How can I protect myself from spyware?

A
  • Install anti-spyware software
  • Input random characters (of a password)
  • Use drop down menus (instead of key presses)
  • Generate time sensitive pins that change regularly
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What does anti spyware software do?

A
  • Finds and removes spyware installed on a computer
  • Stops the recording of key presses …
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is a Hacking?

A
  • The act of gaining illegal access to a computer system …
    • …without the owners consent or knowledge
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

How can I protect myself from hacking?

A
  • Install anti-hacking software
  • Use firewalls
  • Use strong passwords
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are the consequences of hacking?

A
  • Can lead to identity theft
  • Can lead to the loss of personal information
  • Data can be deleted, changed or corrupted
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is a hacker?

A

A person who tries to gain illegal access to a computer or a network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is a cracker?

A

Someone who edits program source code usually for a malicious purpose

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is cracking?

A

The act of illegally changing the source code of a program so that it can be exploited for another use

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Explain what is meant by a DOS attack

A
  • Denial of Service (DoS) attack
  • A large number of requests are sent to the network or server all at the same tim
  • Designed to flood a network/server with useless traffic/requests
  • The network/server will come to a halt trying to deal with all the traffic/requests
  • Prevents users from gaining access to a website/server
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are the signs of a DOS attack?

A
  • Slow network performance e.g. accessing websites
  • Unable to access particular websites or files
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

How can you prevent a DOS attack?

A
  • Using an up-to-date malware/virus checker
  • Setting up a firewalls to restrict traffic to a server
  • Applying email filters to manage unwanted spam.
  • Be careful when opening attachments
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is a Phishing?

A
  • Creator sends a legitimate looking email
  • User then clinks on a link and they are sent to a fake website
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

How can I protect myself from phishing?

A
  • ISP’s can filter out phishing emails
  • Don’t click on links
  • Look out for spelling errors
  • Look out for lack of personalisation e.g. Dear customer
  • Check the URL (link) is correct
18
Q

What are the consequences of pharming?

A
  • Steals personal data when user enters details
  • This leads to fraud or theft
19
Q

What are the consequences of phishing?

A
  • Steals personal data when user enters details
  • This leads to fraud or theft
20
Q

What is a Pharming?

A
  • Malicious code installed on a computer or web server
  • Code redirects the user to a fake website
  • Hacker can change IP address on the DNS server
21
Q

How can I protect myself from Pharming?

A
  • Install anti-spyware/virus software
  • Check the URL of any links you click on
22
Q

What is a Wardriving?

A
  • Locating and using wifi connections illegally
  • Equipment needed is a …
    • Laptop
    • Wireless Network Card
    • Antenna to pick up wireless signals
23
Q

How can I protect myself from Wardriving?

A
  • Use of WEP encryption
  • Strong password protection for router
  • Use of firewall to prevent outside access
24
Q

What are the consequences of wardriving?

A
  • Steals a users download/data allowance
  • Can access wireless network to steal personal data
25
Q

What is a SPAM?

A
  • Junk/ unsolicited email
  • Sent to large numbers of people
26
Q

How can I prevent SPAM?

A
  • Use a spam filter
  • Do not give out your email address
  • Keep an eye out for tick boxes when signing up
27
Q

What is SPAM used for?

A
  • Advertising
  • Spreading malware
28
Q

What is a trojan horse?

A

A program which is often disguised as legitimate software
… but with malicious instructions embedded within it.
They need to be executed by the end user
Once installed they can steal personal information
Often used to install spyware/ransomware
Often arrive as message attachments

29
Q

How can I protect myself from a trojan horse?

A

Install anti-malware software
Don’t use software from unknown sources
Be careful when opening attachments

30
Q

What is a worm?

A

Stand-alone malware that can self-replicate
Intention is to spread to other computers and corrupt networks
They replicate without being triggered by an end user (unlike virus’)
Often arrive as message attachments

31
Q

How can I protect myself from a worm?

A

Install anti-malware software
Don’t use software from unknown sources
Be careful when opening attachments

32
Q

What is adware?

A

Attempts to flood the end-user with unwanted advertising
It can generate advertising pop-ups
It can hijack a browser and redirect it to promotional advertising
It can be difficult to identify using anti-malware software

33
Q

How can I protect myself from adware?

A

Install anti-malware software
Don’t use software from unknown sources
Be careful when opening attachments

34
Q

What is ransomware?

A

Programs that encrypt data on a user’s computer …
… restricting access to the computer until a ransom is paid
The cybercriminal waits until the ransom money is paid …
… then , sometimes, the decryption key is sent to the user

35
Q

How can I protect myself from ransomware?

A

Install anti-malware software
Don’t use software from unknown sources
Be careful when opening attachments

36
Q

What is a DDoS attack

A

A distributed denial of service attack.
The spam traffic originates from many different computers
(making it harder to stop)

37
Q

What is social engineering?

A

Manipulating people into breaking normal security procedures (e.g. giving away a password) …
… in order to gain illegal access to computer systems or to install malware

38
Q

What human emotions do social engineers exploit?

A
  • *Fear** - the user is panicked into believing their computer is in immediate danger
  • *Curiosity** - they may find an infected memory stick lying around and try to use it
  • *Trust**: a belief that genuine sounding companies and people are legitimate
39
Q

Social Engineering - what are the 5 main types of threat?

A
  • *Instant Messaging** - Malicious links are embedded into instant messages;
  • *Scareware** - For example a pop-up message that claims that the users computer is infected with a virus;
  • *Phishing scams** - Tricked to open a link in an email that redirects their browser to a fake website
  • *Baiting** - The cybercriminal leaves a malware-infected memory stick somewhere where it can be found
  • *Phone Calls** - an “IT professional” calls someone and pretends their device is compromised to get them to download malicious software
40
Q

What is a brute force attack?

A

When a hacker tries to crack your password by …
… systematically trying all of the different possible combinations

To reduce the number of attempts you can

  • Use a list of common passwords and try these
  • Use a strong word list to generate passwords