Chap 5.2 - The internet & its uses (cyber security threats) Flashcards

(57 cards)

1
Q

8 cyber security threats

A

-DDos
-Malware
-Hacking
-Pharming
-Phishing
-Social engineering
-Brute force attack
-Data interception

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is brute force attack

A

a type of cyber security attack that tries to guess the user’s password using all possible combination of characters

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

How is brute force attack done

A

uses a program that automatically generates and tests different passwords until the right one is found

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

how does quality of password affect the effectiveness of brute force attack

A

weak password - effective
strong password - time- consuming

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

2 ways to reduce number of attempts for brute force attack

A

-check is password is one of the common ones
-use a strong words list

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is data interception

A

type of cyber security attack where transmitted data is stolen

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

how do you make brute force attack harder

A

-change passwords frequently
-long passwords with variation of characters

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

How is data interception done

A

-packet sniffer
-packet injection
-Man in the Middle ( MITM)
-wardriving / Access Point Mapping

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

what does packet sniffers do

A

examine data packets transmitted over a network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

is packet sniffing done in wireless or wired network

A

both

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

what does packet injection do

A

forging data packets and sending them back in the network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

why is packet injection used

A

-to intercept/ disrupt transmitted data packets
-causes network quality to degrade - blocks user from accessing network resources

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

what does Man in the Middle do (MITM)

A

hacker secretly intercepts data between 2 people who think they are communicating directly

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

what does wardriving/ Access Point Mapping do

A

-intercepting data from a wireless network using a device, antenna, GPS device and software outside the building

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

ways to safe guard from data interception

A

-have complex passwords to protect wireless router
-don’t use free public wifi
-us Wired Equivalence Privacy protocol (WEP)
-use a firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What does Wired Equivalency Privacy protocol do

A
  • encrypts wifi transmission - makes data incomprehensible to hacker
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is hacking

A

a type of cyber attack that involves gaining unauthorised access to a computer system or network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

how is hacking done

A
  • social engineering
    -exploits vulnerabilities in computer system or network
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What is the limitation of encrypting data form hacking

A

it doesn’t prevent hacker from corrupting files but it makes data incomprehensible

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

what can hacking do

A

-change data
-delete or pass on data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

How do you prevent hacking

A

-use firewalls
-use proxy server
-frequently change passwords
-use strong passwords

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

what is ethical hacking

A

hackers are paid to test company’s systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What is DDoS

A

-Distributed denial of services
-type of cyber security attack that overwhelms website/ server with traffic using many botnets

24
Q

how is DDoS done

A

-using useless spam traffic - when server is overwhelmed by attackers useless requests to prevent service to user’s legitimate request
-botnet - spam traffic comes from different computers controlled by the attacker

25
why does useless spam traffic work
-server can only handle a finite number of requests
26
what does DDoS do to user
-prevents users access to emails, websites, online services
27
3 signs of DDoS attacks
-slow network performance -unable to access websites -spam emails
28
how to reduce DDoS
-use an up to date anti- malware -firewall to restrict traffic -email filters to filter unwanted emails
29
What is phishing
-deceptive messages, text, calls to lure user to fake websites to login in their details
30
what is must be done for phishing to work
user must initiate at attack
31
what do phishing messages usually have
-appear to be trust worthy -create panic and fear in user to make them act without thinking -have typos/ grammatical errors
32
what is spear phishing
phishing done to specific people
33
How to prevent phishing
-don't click on links/ emails until total certainty that it's safe -look for secure website protocol -run anti- phishing tools bar
34
what is pharming
type of cyber security attack where computer's system or DNS is manipulated to redirect user to a fake website
35
what is the difference between pharming and phishing
pharming does not need user to initiate attack
36
How is pharming done
-malware -DNS cache poisoning
37
what does DNS cache poisoning do
- changes real Ip address of URL to the one of the fake website
38
What does malware do (pharming)
-alters the host's files that map domain names to Ip address to direct user to fake website
39
How to prevent Pharming
-use anti- virus software -check website for correct address -look for secure protocol
40
difference btw phishing & pharming
-phishing tricks people to provide info through fake emails/ websites but pharming redirect users to fake websites without their knowledge -phishing needs user to interact but pharming exploit vulnerabilities to redirect users
41
What is social engineering
-manipulating users into revealing information or taking action -to gain illegal access to comp or put malware -try to impersonate or create a fake situation so they can scare or give advise on
42
5 ways social engineering is used
-instant messages -phone calls -bait -scareware -email/ phishing scams
43
how is instant messaging used in social engineering
attacker send message to user to click malicious link
44
how is scareware used in social engineering
-message with a fake situation is sent to user to scare them into initiating the attack without thinking
45
how is baiting used in social engineering
clickbait - user is tricked into clicking link and gets nothing in return pen drive bait - user plugs in malware infected memory stick that was intentionally left by attacker
46
how is emails/ phishing scams used in social engineering
-user is tricked into opening an email and is redirected to a fake website
47
how is phone calls used in social engineering
attacker advises user on fake situation to get information out of them
48
What is tactics do social engineering have
-impersonating -create urgency and fear to make user act without thinking -scarcity and opportunity - offering details to get user's information
49
What is malware
a type of software designed to harm a computer's system
50
6 types of malware
-virus -worm -torjan horse -adware -ransomware -spyware
51
what is a virus and how does it work
-program that replicates itself to damage files or malfunction user's computer -needs an active host sent as emails, infected websites or software to be downloaded
52
what is a worms and how does it work
-standalone virus that replicate itself to spread to other computers -doesn't need and active host -rely on security failures to move through the network -one infect computer can infect the whole network
53
what is a spyware and how does it work
software that records all key presses & transmits these to a third party
54
what is a adware and how does it work
-software that flood user's computer with ads -usually as pop- up -hard to remove - difficult to determine its harmfulness by anti- malware -hijacks browser and creates it own defult search requests -shows weakness in computer's system which may be exploited by other malware
55
what is a ransomware and how does it work
-program that encrypts user's data until money is paid -installed on computer through a torjan horse or social engineering
56
what is a trojan horse and how does it work
-programs disguised as legitimate softwares -need an active host -spyware and ransomware often installed though this
57
5 ways to target and attack intended victim
-spear phishing- use deceptive calls, links and messages -ransomware- encrypt user's data, demand money to decrypt it -malware infected memory sticks- put in comp to infect comp -instant messaging- malicious links -scareware- fake antivirus softwares