Computers πŸ’» | Cyber S̸̈eΜΈΜ‰cΜ΄Μ’uΜΆΝ„Μ«rΜ·Μ‹iΜ΅Μ”Μ—ţ̸̍y̴̝̅| 5.2 Flashcards

1
Q

List some examples of cyber security threats.

A
  • Brute-force attack
  • Data interception
  • Distributed denial of service (DDoS) attack
  • Hacking
  • Malware (virus, worm, Trojan horse, spyware,
    adware, ransomware)
  • Pharming
  • Phishing
  • Social engineering
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Define brute-force attack

A

A β€˜trial and error’ method used by cybercriminals to crasck passwords by finding every possible combination of letters, numbers, and symbols until the password is found

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Describe how a brute force attack tries to crack a password in a reduced number of attempts

A
  1. Start by cheecking if the password is one of the most common ones used
  2. If not, start with a strong word list
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Define word list

A

A text file containing a collection of words used in a brute force attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Define data interception

A

An attempt to eavesdrop on a wired or wireless network transmission

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Define packet sniffer

A

A method used by a cybercriminal to examine data packets being sent over a network and to find the contents of a data packet, which are sent back to the cybercriminal

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Define wardriving

A

Using a laptop, antenna, GPS device and software to intercept Wi-Fi signals and illegally obtain data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Name two methods of data interception

A
  • Packet sniffing
  • Wardriving
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Define Wired Equivalency Privacy

(WEP)

A

An algorithm for wireless networks to protect them against data interception

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are some ways to prevent data interception?

A
  • Encryption
  • Using WEP encryption protocol
  • Using a firewall
  • Using complex passwords for routers
  • Not using public Wi-Fi due to no data encryption
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Define Denial of Service

(DOS)

A

A cyberattack in which crybercriminals seek to disrupt the normal operation of a website by flooding it with requests

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is the purpose of DOS?

A

To prevent users from accessing part of a network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What does DoS commonly try to prevent users from accessing?

A
  • Emails
  • Websites/webpages
  • Online services such as banking
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

How does a DoS attack prevent a website from operating?

A

The server can only handle a finite number of requests. So if it becomes overloaded by an attacker sending out thousands of requests, it cannot service a user’s legitimate request

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What does DDoS stand for?

A

Distributed Denial of Service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

How does a DDoS differ from a DoS?

A

In a DDoS attack, the spam traffic originates from many computers, making it difficult to block the traffic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

How does a DoS attack target emails?

A
  1. An attacker sends many spam emails to an email account
  2. As ISPs only allow a specific data quota for each user, it clogs up the account
  3. The user cannot recieve legitimate emails
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

In what ways can a website or user guard against a DoS attack?

A
  • Use an upto date malware checker
  • Set up a firewall to restrict traffic to and from the web server or user’s computer
  • Apply email filters to filter out unwanted traffic such as spam
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What signs may signify a DoS attack?

A
  • Slow network performance
  • Inability to access certain websites
  • Large amounts of spam emails reaching user’s email account
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Define hacking

A

The act of gaining illegal access to a computer system without the owner’s permission

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Why can’t encryption prevent hacking?

A

It makes the data meaningless to the hacker but it doesn’t stop them from deleting, corrupting, or passing on the data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

How can hacking be prevented?

A
  • Firewalls
  • Anti-hacking software / intrusion detection
  • Frequently changed strong password
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Define ethical hacking

A

When companies authorise paid hackers to check out their seurity measures and test how tobust their computer systems are to hacking attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Define malware

A

Programs installed on a user’s computer with the aim of deleting, corrupting, or manipulating data illegally

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

List the types of malware.

A
  1. Viruses
  2. Worms
  3. Trojan horse
  4. Spyware
  5. Adware
  6. Ransomware
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Define virus

A

A program or progam code that replicates itself with the intention of deleting or corrupting files, or by causing the system to malfunction

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Define active host

A

Functioning software that a virus can affect by attatching itself to the code or by altering the code to allow the virus to carry out its attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

What are some ways in which a virus can cause a computer to malfunction?

A
  • Corrupting important files
  • Deleting .exe files
  • Filling up the hard drive with β€˜useless’ data
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

How can viruses be avoided?

A
  • Don’t open emails from unknown sources
  • Don’t install non-original software
  • Don’t download unknown email attatchments
  • Always run an up-to-data virus scanner
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

Define worm

A

A standalone type of malware that can self-replicate.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

How do worms differ from viruses?

A

Unlike viruses, worms don’t need an active host; they can spread throughout a network without the need for any action by an end-user

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

How do worms spread?

A

They remain inside applications allowing them to move thoughout networks. Rather than targeting specific files, they rely on security failures in networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

How do worms frequently arrive to users?

A

As messager or email attatchement: one email opened may infect the whole network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

Define Trojan Horse

A

A type of malware that is designed to look like legitimate software but contains malicious code that can cause damage to a computer system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

Why can security measures such as firewalls often be useless against trojan horses?

A

Trojan horses rely on tricking the end user, so such security systems can be overridden when users initiate the running of malware

36
Q

Define spyware

A

A type of malware that gathers information by monitoring a user’s activities on a computer and sends the gathered information back to the cybercriminal who sent out the spyware

37
Q

What kind of data does spyware try to capture?

A

Bank account numbers, passwords, credit card numbers

38
Q

Define adware

A

A type of malware that attempts to flood the end-user with unwanted advertising

39
Q

Despite adware not necessarily being harmful, what are the concerns surrounding it?

A
  • It highlights weaknesses in the user’s security defences
  • It can be hard to remove, as most anti-malware software do not know if it is harmful
  • It can hijack a browser and create its own default search requests
40
Q

Define ransomware

A

A type of malware that encrypts data on a user’s computer and β€˜holds the data hostage’. A decryption key is sent to the user if they pay a sum of money

41
Q

Define phishing

A

Sending out legitimate-looking emails designed to trick the recipients into giving their personal details to the sender of the email

42
Q

How can users avoid phishing?

A
  • Be aware of new phishing scams
  • Not click on email links unless totally certain it is safe to do so
  • Run anti-phishing toolbars on browsers
  • Always look out for https in address bar
  • Regularly check online accounts and passwords
  • Use an up-to-date browser and a good firewall
  • Be wary of popups and block them
43
Q

Define pharming

A

Redirecting a user to a fake website in order to illegally obtain personal data about the user without their knowledge

44
Q

How does pharming differ from phishing?

A

The user doesn’t need to take any action for it to be initiated - the website merely redirects

45
Q

What method is often used by pharmers to redirect users to a fake website?

A

DNS cache poisoning

46
Q

How does DNS cache poisoning work?

A

Changing the real IP addresses on a DNS server so that the user’s computer redirects to a fake website

47
Q

How can the risk of pharming be mitigated?

A
  • Use of antivirus software to detect unauthorised alterations to a website address
  • Using a modern browser that alertts the user of such an attack
  • Checking the spelling of website
  • Making sure websites are https
48
Q

Define social engineering

A

Manipulating people into breaking normal security procedures in order to gain illegal access to computer systems or place malware on the computer

49
Q

List some examples of social engineering threats

A
  • Malicious links in instant messages
  • Scareware: popup messages telling the user they are infected
  • Emails that trick the user with how genuine it is
  • Baiting: leaving a malware-infected memory stick somewhere it can be found
  • Phone calls: β€œIT professionals” calling users and claiming their device is compromised
50
Q

Define access levels

A

Different levels of access in a computer system allowing a hierarchy of access levels depending on user’s level of security

51
Q

How do access levels improve security?

A

Only the trusted administrator will have the rights to delete important files, have access to vital data, etc.

Others will not have those rights but still be able to use the computer

52
Q

Define anti-spyware

A

Software that detects and removes spyware programs installed on a system; the software is based on typical spyware rules or known file structures

53
Q

How does an anti-spyware based on rules work?

A

The software looks for typical features usually associated with spyware

54
Q

How does an anti-spyware based on file structures work?

A

The software looks for file structures generally associated with potential spyware

55
Q

What are the general features of anti-spyware?

A
  • Detect and remove malware already on device
  • Prevent a user from downloading spyware
  • Encrypt files to make the data more secure in case it is spied on
  • Encrypt keyboard strokes to remove the risk poised by keylogging
  • Blockin acceess to webcam and microphone
  • Scanning for signs that the user’s personal information is stolen, warning the user
56
Q

Define authentication

A

The process of proving a user’s identity by using something they know, have, or is unique to them

57
Q

What features does a strong password contain?

A
  • At least one capital letter
  • At least one numerical value
  • At least one other keyboard character
58
Q

What are the methods of authentication?

A
  • Username and password
  • Biometrics
59
Q

What are some examples of biometrics?

A
  • Fingerprint scans
  • Retina scans
  • Face recognition
  • Voice recognition
60
Q

Define biometrics

A

Type of authentication that uses a unique human characteristic

61
Q

Explain how fingerprint scans work

A
  • Images of fingerprints are compared against previously scanned fingerprint images stored in a database. If they match, the user has been correctly recognised.
  • The system compares patterns of β€˜ridges’ and β€˜valleys’
62
Q

What are the benefits of fingerprint scanning as a biometric?

A
  • Fingerprints are unique
  • Other security devices like magnetic cards can be stolen, but u cant steal a finger
63
Q

What are the drawbacks of fingerprint scanning?

A
  • Relatively expensive to install and set up
  • If a person’s fingers are damaged via injury it may effect scanning accuracy
64
Q

Explain how a retina scan works.

A

Infrared light is used to scan the unique pattern of blood vessels in the retina.

65
Q

What are the benefits of retina scanning?

A
  • Very high accuracy
  • No known way to replicate a person’s retina
66
Q

What are the drawbacks of retina scans?

A
  • Very intrusive
  • Can be relatively slow to verify retina scan
  • Very expensive
67
Q

What are the benefits of face recognition?

A
  • Non intrusive method
  • Relatively inexpensive technoloy
68
Q

What are the drawbacks of face recognition?

A
  • Can be affected by lighting, age, hair, glasses, etc.
  • Can be fooled with a picture sometimes
69
Q

What are the benefits of voice recognition?

A
  • Non-intrusive method
  • Quick verification
  • Relatively inexpensive
70
Q

What are the drawbacks of voice recognition?

A
  • Person’s voice can be easily recorded and used for unauthorised access
  • Low accuraccy
  • An illness can change a person’s voice
71
Q

Define two-step verification

A

A type of authentication that required two methods of verification to prove the identity of the user

72
Q

How is the second step of two-step verification often carried out?

A

A one-time pass code is sent to the user, after they enter a password, via email or app, and the code is entered to verify the authenticity

73
Q

What are automatic software updates?

A

Software on computers an mobile phones or tablets that is kept up-to-date.

74
Q

How are automatic software updates important?

A

They may contain patches to improve the software security or performance.

75
Q

What actions can users take to determine the genuinity of emails or websites?

A
  • Watching for spelling or grammatical errors
  • Making sure the tone of the email is appropriate
76
Q

Define firewall

A

Software or hardware that sits between a computer an an external network. The firewall monitors and filters all incoming and outgoing traffic

77
Q

List the tasks carried out by a firewall.

A
  • To examine the traffic between user’s computer and a public network
  • Checks whether incoming or outgoing data meets a given set of criteria; blocking if not.
  • Logging all incoming and outgoing traffic to allow later interrogation by the user
78
Q

A firewall can either be …

A

hardware or software

79
Q

In what circumstances is a firewall ineffective?

A
  • When individuals use their own hardware devices to bypass the firewall
  • Employee misconduct
  • When users on standalone computers choose to disable the firewall
80
Q

Define proxy servers

A

A server that acts as an intermediary server through which internet requests are processed; it ooften makes use of cache memory to speed up webpage access

81
Q

What are the features of a proxy server?

A
  • Can filter internet access
  • Keeps user IP address secret
  • Blocking requests from certain IP addresses
  • Preventing direct access to a web server by sitting between the user and the web server
  • If an attack is launched such as DoS, it hits the proxy server instead
  • Using cache, it can speed up access to data from a website
  • Can act as a firewall
82
Q

Define privacy settings

A

Controls available on social networking and other websites which allow users to limit who can access their profile

83
Q

What are some examples of privacy settings?

A
  • β€˜do not track’ setting
  • A check to see if payment methods are saved on websites
  • Web browser privacy options - history and cookies
  • Website adveritising opt-outs
  • Sharing of location data or not
84
Q

Define Secure Sockets Layer

(SSL)

A

A security protocol used when sending data over a network such as the internet

85
Q

How does SSL work?

A

Whe a user logs onto a website SSL encrypts the data so only the user’s computer and the web server can make sense of what is being transmitted. The padlock symbol in the status bar shows this.

86
Q

Define SSL certificate

A

A form of digital certificate which is used to authenticate a website; providing the SSL certificate can be authenticated, any communication or data exchange between browser and website is secure