Cyber Security Flashcards
Brute Force Attack:
trial-and-error method to crack passwords by trying every possible combination until the correct one is found
Aim of brute force attack
to gain unauthorised access to a system or network
Data interception
eavesdropping on communication channels to intercept and steal sensitive information, It uses packet sniffing
Packet sniffing
uses packet sniffers to examine data packets sent over a line, all data collected is sent back to the attacker
Aims of data interception
- to steal sensitive information
- Can delete or corrupt files/data
Distributed Denial of Service (DDoS) Attack
multiple computers are used as bots, to flood a server with lots of requests at the same time which the server can’t respond to; causing it to crash and become unavailable to users
Aims of DDoS
Revenge
Entertainment value
To affect a company’s reputation
To test a systems resilience
To demand a ransom to stop it
Process of DDoS
- Malware downloaded to several computers
- Computers turn into bots.
- Creating a network of bots
- Third party initiates the attack
- Bots send requests to a web SERVER at the same time
- Web server fails due to the requests
- Legitimate requests cannot reach the web server
Hacking
gaining unauthorised access to a system or network to steal or manipulate data
Aims of hacking
- Identity theft
- gain personal information
- Data can be deleted, changed or corrupted.
Virus
piece of code that attaches itself to a file and replicates itself to spread to other files on the computer.
Aims of virus
- cause damage to the system
- deleting data
- damaging hardware
Worm
standalone program that can spread and replicate itself over computer networks. It can take up storage space and bandwidth
Trojan horse
software that is disguised as a legitimate software, when downloaded the other malware it contains is installed.
Adware
code that generates unwanted adverts on a user’s computer, when clicked may link to viruses or redirects users to fake websites.