Chapter 9 Flashcards

1
Q

botnet

A

a network of private computers infected with malicious software and controlled as a group without the owners’ knowledge

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Distributed Denial of Service attack

A

many hacked computers send a large number of simultaneous request to the server, causing servers to become overloaded and crash

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

hacktivism

A

people want to make a political statement by using technological means

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

data harvesters

A

criminals who only steal data to resell them

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

cash-out fraudster

A

someone who buys data from a data harvester

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

white hat hacker

A

good natured hacker

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

black hat hacker

A

cybercriminal

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

social engineering

A

forger who impersonates an identity of a person or company in which people or companies are fooled

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

spear phishing attack

A

when there is a focus on a specific target group

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

spoofed message

A

messages which pretend to be from a friend

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

zero-day exploits

A

attacks that are so new that they have not been processed in security systems yet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

biometrics

A

technologies that measure human characteristics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

SQL injection technique

A

people can be registered and removed from the file of a website

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

intrusion detection system

A

help to stop these types of criminals (SQL injection technique criminals) because this type of software specialises in identifying unauthorised behavior

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

malware

A

malicious software that searches for weak spots in a security system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

worm

A

damages other software or files whereby the worm independently finds its way

17
Q

trojan

A

malware that tries to penetrate by pretending to be something else

18
Q

malicious adware

A

programs that provide unwanted advertisements

19
Q

CAPTCHA’s

A

tasks you must perform to prove that you are a human and not a computer

20
Q

RAM scraping or storage scanning software

A

a code that scans the computer memory to find sensitive data

21
Q

ransomware

A

users must pay money to regain access to these files

22
Q

blended threat

A

when multiple types of malware to plan an attack are used

23
Q

brute force attack

A

trying all passwords to enter an account

24
Q

public key encryption

A

there is public key that is used when locking data. People that have a separate, private key that they can use to access the data

25
certificate authority
party that authenticates the encryption by means of the public key
26
dumpster diving
searching waste for valuable data
27
shoulder surfing
valuable data is gathered by observing people
28
patch
software update that improves security shortcomings