Cyber Security Flashcards

1
Q

Brute Force Attack:

A

trial-and-error method to crack passwords by trying every possible combination until the correct one is found

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Aim of brute force attack

A

to gain unauthorised access to a system or network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Data interception

A

eavesdropping on communication channels to intercept and steal sensitive information, It uses packet sniffing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Packet sniffing

A

uses packet sniffers to examine data packets sent over a line, all data collected is sent back to the attacker

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Aims of data interception

A
  • to steal sensitive information
  • Can delete or corrupt files/data
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Distributed Denial of Service (DDoS) Attack

A

multiple computers are used as bots, to flood a server with lots of requests at the same time which the server can’t respond to; causing it to crash and become unavailable to users

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Aims of DDoS

A

Revenge
Entertainment value
To affect a company’s reputation
To test a systems resilience
To demand a ransom to stop it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Process of DDoS

A
  • Malware downloaded to several computers
  • Computers turn into bots.
  • Creating a network of bots
  • Third party initiates the attack
  • Bots send requests to a web SERVER at the same time
  • Web server fails due to the requests
  • Legitimate requests cannot reach the web server
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Hacking

A

gaining unauthorised access to a system or network to steal or manipulate data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Aims of hacking

A
  • Identity theft
  • gain personal information
  • Data can be deleted, changed or corrupted.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Virus

A

piece of code that attaches itself to a file and replicates itself to spread to other files on the computer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Aims of virus

A
  • cause damage to the system
  • deleting data
  • damaging hardware
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Worm

A

standalone program that can spread and replicate itself over computer networks. It can take up storage space and bandwidth

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Trojan horse

A

software that is disguised as a legitimate software, when downloaded the other malware it contains is installed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Adware

A

code that generates unwanted adverts on a user’s computer, when clicked may link to viruses or redirects users to fake websites.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Ransomware:

A

code that stops a user accessing data by encrypting the data, a fee has to be paid to decrypt the data

16
Q

Effect of ransomware

A
  • It can cause data loss
  • financial damage
  • disrupt business operations
17
Q

Spyware

A

software that records the key presses on computer by user, the data is analysed for patterns and personal details are identified and sent to a third party

18
Q

Prevention of spyware

A
  • drop down boxes
  • touchscreen keyboard
  • an algorithm that scrambles the data
19
Q

Phishing

A

Attackers send legitimate looking emails, this contains a link to a fake website where the user is encouraged to enter their details

20
Q

Aim of phishing

A

steal sensitive information

21
Q

Pharming

A

malicious code being downloaded on computer without the user’s knowledge
This redirects the user to a fake website where they’re encouraged to enter their personal details

22
Q

Aims of pharming

A

steal sensitive information

23
Q

Social engineering

A

manipulating individuals to gain access to confidential information.

24
Q

Aims of social engineering

A

Exploit human behaviour and vulnerabilities to gain unauthorised access to a system or network

e.g baiting, impersonation

25
Q

Phising prevention

A
  • Don’t open links from unknown emails
  • Use anti-phishing tools
  • Block pop up ads
26
Q

Firewalls

A
  • can be software or hardware based
  • monitors incoming and outgoing traffic between the computer and the network
  • user sets criteria for the traffic (whitelist and blacklist), traffic is compared with this
  • firewall will accept or reject based on this
  • Can alert user
27
Q

DDoS prevention

A

Proxy server

28
Q

Proxy Server

A
  • act as an intermediate between a user and a web server.
  • It examines and filters incoming internet traffic
  • Protects against DDoS
  • If an attack is launched it hits the proxy server instead
  • Used to direct invalid traffic away from server
  • Proxy server blocks multiple requests from the same IP address within a timeframe
  • Keeps users IP addresses hidden
29
Q

Similarities of Firewalls and Proxy servers:

A

Filter incoming network traffic
Store backlist or whitelast
Block unauthorised access
Keep a log of traffic
Can be hardware or software or both.

30
Q

Differences of firewalls and proxy servers:

A

Proxy server used to prevent DDoS
Proxy can hide users IP address, firewall does not hide users IP address
Proxy intention is to divert attack from server, firewall is to stop unauthorised access.
Proxy protects web servers, firewalls protect individual computers.

31
Q

NOTE:
when to say firewall and when to say proxy server?

A

if questions says to protect a server, say proxy, if it says a computer, say firewall

32
Q

SSL

A
  • Security protocl which encrypts data transmitted over internet
  • It works by sending a digital certificate to the user’s browser
  • This contains the public key which can be used for authentication
  • Once the certificate is authenticated, the transaction will begin
33
Q

Saftey preventions

A
  • Access Rights
  • Passwords
  • Virtual Methods (touchscreen keyboard)
  • Physical Methods (CCTV)
  • Firewall
  • Proxy Server
  • Two-factor authentication
  • Biometric Device
  • Encryption
  • Anti/spyware/virus/malware