Chap 5.2 - cyber security threats Flashcards

1
Q

8 cyber security threats

A

-DDos
-Malware
-Hacking
-Pharming
-Phishing
-Social engineering
-Brute force attack
-Data interception

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is brute force attack

A

a type of cyber security attack that tries to guess the user’s password using all possible combination of characters

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

How is brute force attack done

A

uses a program that automatically generates and tests different passwords until the right one is found

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

how does quality of password affect the effectiveness of brute force attack

A

weak password - effective
strong password - time- consuming

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

2 ways to reduce number of attempts for brute force attack

A

-check is password is one of the common ones
-use a strong words list

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is data interception

A

type of cyber security attack where transmitted data is stolen

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

how do you make brute force attack harder

A

-change passwords frequently
-long passwords with variation of characters

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

How is data interception done

A

-packet sniffer
-packet injection
-Man in the Middle ( MITM)
-wardriving / Access Point Mapping

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

what does packet sniffers do

A

examine data packets transmitted over a network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

is packet sniffing done in wireless or wired network

A

both

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

what does packet injection do

A

forging data packets and sending them back in the network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

why is packet injection used

A

-to intercept/ disrupt transmitted data packets
-causes network quality to degrade - blocks user from accessing network resources

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

what does Man in the Middle do (MITM)

A

hacker secretly intercepts data between 2 people who think they are communicating directly

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

what does wardriving/ Access Point Mapping do

A

-intercepting data from a wireless network using a device, antenna, GPS device and software outside the building

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

ways to safe guard from data interception

A

-have complex passwords to protect wireless router
-don’t use free public wifi
-us Wired Equivalence Privacy protocol (WEP)
-use a firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What does Wired Equivalency Privacy protocol do

A
  • encrypts wifi transmission - makes data incomprehensible to hacker
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is hacking

A

a type of cyber attack that involves gaining unauthorised access to a computer system or network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

how is hacking done

A
  • social engineering
    -exploits vulnerabilities in computer system or network
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What is the limitation of encrypting data form hacking

A

it doesn’t prevent hacker from corrupting files but it makes data incomprehensible

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

what can hacking do

A

-change data
-delete or pass on data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

How do you prevent hacking

A

-use firewalls
-use proxy server
-frequently change passwords
-use strong passwords

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

what is ethical hacking

A

hackers are paid to test company’s systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What is DDoS

A

-Distributed denial of services
-type of cyber security attack that overwhelms website/ server with traffic

24
Q

how is DDoS done

A

-using useless spam traffic - when server is overwhelmed by attackers useless requests to prevent service to user’s legitimate request
-botnet - spam traffic comes from different computers controlled by the attacker

25
Q

why does useless spam traffic work

A

-server can only handle a finite number of requests

26
Q

what does DDoS do to user

A

-prevents users access to emails, websites, online services

27
Q

3 signs of DDoS attacks

A

-slow network performance
-unable to access websites
-spam emails

28
Q

how to reduce DDoS

A

-use an up to date anti- malware
-firewall to restrict traffic
-email filters to filter unwanted emails

29
Q

What is phishing

A

-deceptive messages, text, calls to lure user to fake websites to login in their details

30
Q

what is must be done for phishing to work

A

user must initiate at attack

31
Q

what do phishing messages usually have

A

-appear to be trust worthy
-create panic and fear in user to make them act without thinking
-have typos/ grammatical errors

32
Q

what is spear phishing

A

phishing done to specific people

33
Q

How to prevent phishing

A

-don’t click on links/ emails until total certainty that it’s safe
-look for secure website protocol
-run anti- phishing tools bar

34
Q

what is pharming

A

type of cyber security attack computer’s system or DNS is manipulated to redirect user to a fake website

35
Q

what is the difference between pharming and phishing

A

pharming does not need user to initiate attack

36
Q

How is pharming done

A

-malware
-DNS cache poisoning

37
Q

what does DNS cache poisoning do

A
  • changes real Ip address of URL to the one of the fake website
37
Q

What does malware do (pharming)

A

-alters the host’s files that map domain names to Ip address to direct user to fake website

38
Q

How to prevent Pharming

A

-use anti- virus software
-check website for correct address
-look for secure protocol

39
Q

What is social engineering

A

-manipulating users into revealing information or taking action
-to gain illegal access to comp or put malware
-try to impersonate or create a fake situation so they can scare or give advise on

40
Q

5 ways social engineering is used

A

-instant messages
-phone calls
-bait
-scareware
-email/ phishing scams

41
Q

how is instant messaging used in social engineering

A

attacker send message to user to click malicious link

42
Q

how is scareware used in social engineering

A

-message with a fake situation is sent to user to scare them into initiating the attack without thinking

43
Q

how is baiting used in social engineering

A

clickbait - user is tricked into clicking link and gets nothing in return
pen drive bait - user plugs in malware infected memory stick that was intentionally left by attacker

44
Q

how is emails/ phishing scams used in social engineering

A

-user is tricked into opening an email and is redirected to a fake website

45
Q

how is phone calls used in social engineering

A

attacker advises user on fake situation to get information out of them

46
Q

What is tactics do social engineering have

A

-impersonating
-create urgency and fear to make user act without thinking
-scarcity and opportunity - offering details to get user’s information

47
Q

What is malware

A

a type of software designed to harm a computer’s system

48
Q

6 types of malware

A

-virus
-worm
-torjan horse
-adware
-ransomware
-spyware

49
Q

what is a virus and how does it work

A

-program that replicates itself to damage files or malfunction user’s computer
-needs an active host
sent as emails, infected websites or software to be downloaded

50
Q

what is a worms and how does it work

A

-standalone virus that replicate itself to spread to other computers
-doesn’t need and active host
-rely on security failures to move through the network
-one infect computer can infect the whole network

50
Q

what is a spyware and how does it work

A

software that monitors user’s online activity and gathers them

50
Q

what is a adware and how does it work

A

-software that flood user’s computer with ads
-usually as pop- up
-hard to remove - difficult to determine its harmfulness by anti- malware
-hijacks browser and creates it own defult search requests
-shows weakness in computer’s system which may be exploited by other malware

50
Q

what is a ransomware and how does it work

A

-program that encrypts user’s data until money is paid
-installed on computer through a torjan horse or social engineering

51
Q

what is a torjan horse and how does it work

A

-programs disguised as legitimate softwares
-need an active host
-spyware and ransomware often installed though this

52
Q

describe how brute force attacks are used

A

-uses trial and error to guess the password
-combinations are repeatedly entered
-either manually or automatically by a software

53
Q

5 ways to target and attack intended victim

A

-spear phishing- use deceptive calls, links and messages
-ransomware- encrypt user’s data, demand money to decrypt it
-malware infected memory sticks- put in comp to infect comp
-instant messaging- malicious links
-scareware- fake antivirus softwares