Issues And Impact Flashcards

1
Q

What are three things malware can be used for

A

To disrupt the normal function of a computer system

To spy on a user’s actions without their knowledge

To gain unauthorised access to a network or computer system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Viruses: what they do and how they spread

A

Viruses can slow down a computer, delete and damage data. They’re installed into a host file and attach themselves to other programs once opened.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Worm: What they do and how they spread

A

Worms slow down the function of a device. They self replicate and are able to spread around networks and through emails by attaching themselves.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Trojans: how they work and how they get onto a device

A

Trojans can deliver ransomware and encrypt files. They can also harvest / delete data and provide backdoor access to other computers on a network.

They are disguised as legitimate software and are installed along with it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Spyware: how they are installed (software ones) and what they do

A

Often installed by a virus. Keyloggers records your keystrokes and uses this information to find your passwords. Sent back to hacker.

Some spyware can take control of your webcam without your knowledge.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Ransomware: what it does and how its installed / initialised / whatever

A

Often a trojan is used to distribute ransomware which encrypts your files.

The attacker demands a payment using difficult to trace methods like bitcoin for your files to be returned.

Sometimes they will leak files if you don’t pay, and sometimes they don’t even return the files.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Pretexting

A

The attacker pretends to be from a legitimate company, and creates a sense of panic in the victim.

They try to get usernames, passwords, bank details and other sensitive information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Baiting (u have won!!!!!!)

A

Victims are offered a free giveaway such as a free game.

When downloaded malware is installed along with it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Phishing

A

Victims receive an email with a link, leading to a realistic login page.

They’re tricked into entering their details (bank details, passwords) and their information is stolen.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Quid pro quo (yt vids)

A

Victims allow access to their computer for a service, such as a slow computer.

The hacker gains control of the device which gives an opportunity to install malware.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Ways of protecting devices from these attacks (3)

A

Acceptable use policy, restricting what users are allowed to do / install / not click links from unknown source

User access levels so if access is gains, the hacker is restricted in what they can uncover and steal.

Encryption. If the data is accessed without permission it will be unreadable and provide no value.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Two things that make a computer more vulnerable to attacks (not people)

A

Unpatched software - malware often exploits weaknesses in software to enter a computer system. Companies regularly update it to prevent this.

Out of date anti malware- signature based anti malware needs to be constantly updated because new malware is constantly being created.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Another way - specifically against ransomware and viruses

A

External backups. If the data is stolen, deleted or corrupted, it can be restored.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Symmetric vs asymmetric encryption

A

Symmetric - same key for encrypt and decrypt

Asymmetric - different, more private key to decrypt

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

One disadvantage of incremental backup, why

A

Takes longer to restore because you have to first restore the full backup, then every incremental backup one at a time.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly