Chapter 4 Flashcards

(40 cards)

1
Q

what is social engineering

A
  • manipulation technique that exploits human error to get private information
  • tend to lure unsuspecting users into exposing data, spreading malware infections, or giving access to restricted systems
  • built around how people think and act. (Once an attacker understands what motivates a user’s actions, they can deceive and manipulate the user effectively.)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

phishing

A

spam/mass
spear (personalized info, target high value

Caution w links
Sender?
Link legit?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

pharming

A

Obtain personal info
Infect legit web w malicious code, redirect to bogus
Web address?
Secure ssl, https

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Smishing

A

Sms phishing

- phone no. or link

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Vishing

A

Alerting the victim to an issue w their account or

Advising the victim of a profitable gain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Malware: Trojan horse

A
  • malicious comp program
  • disguise it self as diff application
  • act similar to comp virus
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

worm

A
  • small comp program
  • find security hole, replicate itself
  • in piece of software or OS
  • make things slow
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Adware

A
  • ad supported software
  • software program used to display, ads, target users by analyzing the web
  • bundled w legit software
  • hard to delete
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Malicious bot

A
  • automated
  • carry out completely, repetitive tasks
  • spam bots
  • zombie bots
  • bot network
  • chatter bot
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

How to avoid malware

A
  • Only open legit programs/ emails/ messages
  • install firewall (monitor internet traffic )
  • antivirus
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Rootkit

A
  • comp program
  • gain admin access to victims computer
  • installed because password is cracked
  • stop comp from recognizing rootkit
  • victim will not know that someone else has complete Access
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Ransomware

A
  • restricts users access to files / comp system
  • demand a ransom be paid in order to access comp system
  • files either gone or encrypted
  • enter similar to Trojan horse
  • Falsely claim that the system had been used for illegal activities
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

repetitive strain injury

A
  • repetitive movements

- need good posture

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is a hacker?

A

A hacker is someone who tries to gain unauthorized access to your computer with the intention of corrupting or stealing data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is spamming?

A

Sending bulk emails such as adverts for products. A large proportion of bandwidth is used so time is wasted opening and reading such emails

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is Phishing?

A

Sending emails that appear to be from a reliable source. Users will often be asked to update their info and this info will then be used by hackers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is malware?

A

Malicious software that is downloaded onto a computer unintentionally by a user

18
Q

Name 3 types of malware?

A
  • Trojan horses
  • worms
  • spyware
19
Q

What is a virus?

A

A program which is designed to damage a computer system

20
Q

How can you protect yourself from viruses?

A

Installing an antivirus program that will regularly scan your computer for threats.

21
Q

What is a trojan horse?

A

It gains entry into a user’s computer ‘ in disguise’ . Once installed some can do major damage like deleting files or displaying annoying pop-ups.

22
Q

What is a worm?

A

A worm spreads around from computer to computer in a network. It does this by replicating itself.

23
Q

What are the problems with worm viruses?

A

Worms require bandwidth which results in slower data transmission speeds

24
Q

What is a key logger?

A

It records a user’s keystrokes. The user is unaware that this is happening. it is used to steal personal info from the user (also used by employers to monitor employees’ activities)

25
What is spyware?
It uses the internet connection to monitor things like the websites a user visit. It can also be used to gather personal and bank details
26
What are the problems with spyware?
It uses valuable memory in some cases the info is sold to a third-party
27
What is data encryption?
The process of scrambling data using a 'key' before it is transmitted onto a network
28
What does the network manager allocate every user?
- A unique username | - users can choose their own password
29
Name 4 ways networks are protected?
- usernames and passwords - access levels - backup - firewall
30
Name and describe the three levels of access to files
- Read only: users can only view the file - Read and copy : users can view and replicate the file - Read and write : users can view and edit the files
31
How are backups used to protect a network?
Backup copies of data are stored on a variety of storage media in safe locations away from the network server e.g and external hard drive
32
What is a firewall?
A piece of software or hardware that is used to monitor and filter data that is entering or leaving a network.
33
What can firewalls do?
- prevent hackers from entering the network via the internet - prevents viruses and spam from entering the network - prevents users downloading undesirable content
34
What is a communication protocol?
This is a set of rules used to allow different computers from different manufacturers to communicate
35
What transfer protocol is used for the internet?
TCP/IP (transmission control protocol/ internet protocol)
36
What does FTP stand for and what is it used for?
(File transport protocol) allows users to send and receive files over the internet.
37
What is Http and what does it stand for?
(hyper text transfer protocol) used by the WWW to identify and transfer web pages using the internet.
38
How does Http work?
When the user enters a URL this protocol sends a command to the web server to request the required web page.
39
What are the main uses of Https?
e-commerce such as: - credit card transactions - bank information
40
How is Https made safer?
Data is encrypted when being transferred via this method