Forms of Attack Flashcards

1
Q

What is Malware?

A
  • It is malicious software that can harm devices
  • Deleting/modifying files, scareware, locking files, spyware, Rootkits, opening backdoors
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

How to stop Malware?

A
  • Firewall
  • Anti-virus
  • Spam filter
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is Phishing?

A
  • Social engineering where criminals send emails or texts to people claiming to be from a well-known business (eg a bank or an online retailer)
  • The email often contains links to spoof versions of a company’s website
  • They then request the user to update their personal information
  • When the user inputs this data, they hand it over to the criminal who can then access their genuine account

These emails are sent to thousands of people

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

How can you stop Phishing?

A
  • Many email programs, browsers and firewalls have anti-phishing features that will reduce the number of phishing emails recieved
  • Poor grammar can also be spotted
  • Staff training
  • Disabling browser pop-ups
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is a Brute Force Attack?

A
  • A type of attack used to gain information by cracking passwords through trial and error
  • It uses automatd softwre to produce hundreds of likely password combinations
  • Hackers may try loads od passwords against one username
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

How to prevent a Brute force Attack?

A
  • Two-factor authentication
  • Locking accounts after a number of password attempts
  • Use strong passwords with a combination of numbers and symbols
  • Progressive delays
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is a Denial-Of-Service attack?

A
  • Where a hacker tries to stop users from accessing a part of a network or a website
  • This involves flooding the network with useless traffic making the network extremely slow or completely inaccessible
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

How to prevent a Denial-Of-Service attack?

A
  • Strong firewall
  • Packet filters on routers
  • Configuring the web server
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is a Distributed Denial of Service?

A

A distributed denial-of-service (DDoS) attack is a DoS attack that uses multiple computers or machines to flood a targeted resource.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is Data Interception and Theft?

A
  • Where hackers try to get access to sensitive information
  • This could be done through a passive or active attack
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is a SQL Injection?

A

Pieces of SQL typed into a website’s input box which then reveal sensetive information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

How to prevent Data interception and Theft?

A
  • Encryption
  • Firewall
  • Staff training : Use of passwords, locking computers, logging off, physically locking areas with computers
  • Investigating your own network for vunerabilities
  • Antivirus, Anti-malware
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

How to prevent SQL attacks?

A
  • Validation on input boxes
  • Penetration testing
  • Setting database permissions
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Way of Preventing Attacks/Mitigating Risks

A
  • Penetration testing
  • Physical security
  • Passwords
  • User access levels (Controls which parts of a network different users can access)
  • Anti-Malware
  • Encryption
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is Penetration testing?

A
  • Employing specialists to stimulate potential attacks on the network
  • Used to indentify possible weaknesses in a network’s security by trying to exploit them
  • The results on the pentest are then reported back
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

How can people be a weak point in a network?

A
  • Not instaling OS updates
  • Not installing anti-malware updates
  • Not locking doors in computer rooms
  • Not logging off or locking computers
  • Leaving printouts on desk
  • Writing passwords down
  • Sharing passwords
  • Not encrypting data
  • Not applying security to wireless networks
16
Q

Physical Security on networks

A
  • Locks and passcodes
  • Surveillance equipment (cameras)
17
Q

What do firewalls do?

A
  • Examines all data that enters or leaves a network and block any potential threats