Chapter 9 Flashcards

1
Q

botnet

A

a network of private computers infected with malicious software and controlled as a group without the owners’ knowledge

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Distributed Denial of Service attack

A

many hacked computers send a large number of simultaneous request to the server, causing servers to become overloaded and crash

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

hacktivism

A

people want to make a political statement by using technological means

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

data harvesters

A

criminals who only steal data to resell them

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

cash-out fraudster

A

someone who buys data from a data harvester

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

white hat hacker

A

good natured hacker

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

black hat hacker

A

cybercriminal

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

social engineering

A

forger who impersonates an identity of a person or company in which people or companies are fooled

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

spear phishing attack

A

when there is a focus on a specific target group

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

spoofed message

A

messages which pretend to be from a friend

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

zero-day exploits

A

attacks that are so new that they have not been processed in security systems yet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

biometrics

A

technologies that measure human characteristics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

SQL injection technique

A

people can be registered and removed from the file of a website

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

intrusion detection system

A

help to stop these types of criminals (SQL injection technique criminals) because this type of software specialises in identifying unauthorised behavior

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

malware

A

malicious software that searches for weak spots in a security system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

worm

A

damages other software or files whereby the worm independently finds its way

17
Q

trojan

A

malware that tries to penetrate by pretending to be something else

18
Q

malicious adware

A

programs that provide unwanted advertisements

19
Q

CAPTCHA’s

A

tasks you must perform to prove that you are a human and not a computer

20
Q

RAM scraping or storage scanning software

A

a code that scans the computer memory to find sensitive data

21
Q

ransomware

A

users must pay money to regain access to these files

22
Q

blended threat

A

when multiple types of malware to plan an attack are used

23
Q

brute force attack

A

trying all passwords to enter an account

24
Q

public key encryption

A

there is public key that is used when locking data. People that have a separate, private key that they can use to access the data

25
Q

certificate authority

A

party that authenticates the encryption by means of the public key

26
Q

dumpster diving

A

searching waste for valuable data

27
Q

shoulder surfing

A

valuable data is gathered by observing people

28
Q

patch

A

software update that improves security shortcomings