Computer Misuse Flashcards
What is hacking era 1
The joy of programming, enjoys the detail and stretching their capabilities, as opposed to most users who prefer to learn only the minimum
What is hacking era 2
The rise of hackings dark side
What is hacking era 3
hacking as a destructive criminal tool, a computer expert whobreaks into computer systems and/or accesses data which would otherwise be unavailable to them
What are the different levels of skills for hackers
Master
Journeyman
Apprentice
Define an apprentice
- They have a basic understanding of how to use attack toolkits.
- They are responsible for the highest volume of attacks, but their attacks are the easiest to defend against.
Define a journeyman
They have the ability to modify attack toolkits. * These attacks are more targeted and are harder to defend against.
Define a master
They have the ability to create new attack toolkits. * Their attacks are hard to defend against and are often zero-day vulnerabilities.
What are the hacker types
white hat
Black hat
gray hat
New
blue hat
red hat
green hat
Define a black hat hacker
people who try to break into systems and/or networds to exploit them for malicious reasons
Define a gray hat hacker
are between black hat and white-hat definition. They move between the two, but they don’t use their skill for personal gain
Define white hat hackers
they are ethical hackers who find vulnerabilities in systems to help strengthen the security of these systems
Define blue hat hackers
to test to systems to see levels of security
Define red hat hackers
those that fight against black hat hackers
Define green hat hackers
new-comers, those at apprentice levels
What is an interruption attack
a hacker disrupts the service being provided and is degraded or unavailable to authorised users
What is an interuption attack
often called Denial of Serivce, Dos, an attempt to make a computer resource unavaliable
What are some example of interruption attack
e.g. DOS - overloading server, vandilising, redirectiing requests to invalid destinations
theft
What is an interception attack
In an interception attack, an unauthorized individual gains access to confidential or private information.
interception attacks are attacks against network confidentiality.
Performed by snooping on network traffic to try to obtain data such as passwords, credit card numbers or other types of sensitive information that may be transmitted in clear text.
What are examples of interception attacks
○ Eavesdropping on communication.
○ Wiretapping telecommunications networks.
○ copying of files or programs.
○ Obtaining copies of messages for later replay
What is a modification attack
where an unauthorised individual not only gains access to, but tampers with information, resources, or services
What are examples of modification attack
○ Modifying the contents of messages in the network.
○ Changing information stored in data files.
○ Altering programs so they perform differently.
○ Reconfiguring system hardware or network topologies.
○ Also called “man in the middle” attacks.
What is a fabrication attack
This is where an individual inserts counterfeit information, resources, or services into the network. Fabrication attacks are attacks against the authentication access control, and authorisation capabilities of the network.
What forms do fabrication attacks come in
○ Inserting messages into the network using the identity of another individual.
○ Replaying previously intercepted messages.
○ Spoofing a web site or other network service.
○ Taking the address of another host or service, essentially becoming that host or service.
○ Also called “masquerading” attacks.
Define a computer virus
a piece of software attached to genuine files (i.e., host file), designed to replicate itself and perform malicious actions (e.g., delete files) when activated.