IT101 COMP SECURITY THREATS Flashcards
No —– = very vulnerable to virus infections
anti-virus software
No anti-virus software = very ——- to virus infections
vulnerable
*A technology term used when someone impersonates
*Ranges from using the name, identification card, SSS
number or any other personal information
*Get a document or credit in your behalf, without the
owner’s knowledge and permission
Identity Theft
Identity Theft
*A technology term used when someone ———-
*Ranges from using the —————- or any other personal information
*Get a document or credit in your behalf, without the
owner’s knowledge and permission
-impersonates
-name, identification card, SSS
number
*Watching someone who withdraws in an ATM machine
*Getting to know his/her PIN (Personal Identification
Number)
Shoulder Surfing
Snagging
*Also known as ———–
* The attacker can listen to your conversation on the
telephone as you give your personal information (credit
card number and other pertinent details)
Wire-tapping or Man-in-the-middle attack
*Also known as Wire-tapping or Man-in-the-middle attack
* The attacker can listen to your conversation on the
telephone as you give your personal information (credit
card number and other pertinent details)
Snagging
*Attacker goes to garbage cans or trash bins to get
cancelled checks, bank deposit slips, or credit card
statements
Dumpster Diving
- Most predominant sources of identity theft
- Theft tricks the unsuspecting victim into providing critical
information under the pretext of something legitimate
(pretending to be one who is in authority)
Social Engineering
Social Engineering
- Most ——– of identity theft
- Theft tricks the unsuspecting victim into providing critical
information under the pretext of something legitimate
(pretending to be one who is in authority)
predominant sources
- attacker recreates the website or support portal of a renowned
company and sends the link to targets via emails or social media
platforms - other person, completely unknown of the real attacker, ends up
compromising personal information and even credit card details
- Phishing
- assumed as a subset of Phishing since it requires an extra effort
from the side of the attackers - need to pay attention to the degree of uniqueness for the limited
number of users they target - the chances of users falling for the false emails are considerably
higher in the case of spear phishing
- Spear Phishing or Whaling Attack
- Old fashioned attack – using a phone
- recreate the IVR (Interactive Voice Response) system of a
company - attach it to a toll-free number and trick people into calling the
phone number and entering their details
- Vishing
- scripted scenario presented in front of the targets, used to
extract PII or some other information - seen various TV shows and movies where detectives use this
technique to get into places where they’re personally not
authorized, or extract information by tricking people
- Pretexting
- Attackers leave infected USB drives or optical disks at
public places with a hope of someone picking it up out of
curiosity and using it on their devices - Various download links, mostly containing malicious software,
are thrown in front of random people hoping someone would
click on them
Baiting
- a person takes help of an authorized person to get access to
restricted areas where RFID authentication or some other
electronic barrier is present
Tailgating
Tailgating
* Also known as ——
* a person takes help of an authorized person to get access to
restricted areas where RFID authentication or some other
electronic barrier is present
piggybacking
- involves people posing as technical support
- make random calls to a company’s employees claiming that
they’re contacting them regarding an issue - involves an exchange of something with the target, for instance,
the attacker trying to solve a victim’s genuine problem; in return,
they will as for a gift
Quid Pro Quo
- Program triggered to perform a task or mission when it
encounters some sequence of events or activities or after
a certain amount of time lapses or when a data come - Friday the 13th Virus and April Fool’s Day virus
Logic Bombs
Logic Bombs
- Program triggered to perform a task or mission when it
encounters some sequence of events or activities or after
a certain amount of time lapses or when a data come
Friday the 13th Virus and April Fool’s Day virus
*A small code that a Web server asks your web browsers
to place in the computer
* Contains pertinent information that identifies your
workstation’s IP address, login name, email address and
other information about the visited site
Cookies
Cookies
*A ——– that a Web server asks your web browsers
to place in the computer
* Contains pertinent information that identifies your
workstation’s IP address, login name, email address and
other information about the visited site
small code
*Offers products or services that usually the user don’t
need or want
*Almost tagged as commercial advertisements
*Defined as unsolicited email
Spam
Spam
*Offers products or services that usually the user don’t
need or want
*Almost tagged as commercial advertisements
*Defined as ——–
unsolicited email