lecture 3 Flashcards

1
Q

What is a cyber attack?

A

an attempt by cybercriminals, hackers or other digital adversaries to access a computer network or system, usually for the purpose of altering, stealing, destroying or exposing information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the goals of hackers towards businesses or organizations?

A

the hacker’s goal is usually to access sensitive and valuable company resources, such as intellectual property (IP), customer data or payment details.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Most common types of Cyber Attacks

A

Gaining, or attempting to gain, unauthorized access to a computer system or its data.
Unwanted disruption or denial of service attacks, including the take down of entire web sites.
Installation of viruses or malware - that is malicious code on a computer system.
Unauthorized use of a computer system for processing or storing data.
Changes to the characteristics of a computer system’s hardware, firmware or software without the owner’s knowledge, instruction or consent, and
Inappropriate use of computer systems by employees or former employees.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Types of cyber Attacks

A

Malware
Phishing
Ransomware
Denial of Service
Man in the middle
Cryptojacking
SQL injection
Exploits

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Denial of service

A

A denial-of-service (DoS) attack is designed to prevent online services from working efficiently, also known as abrute-force attack. It is typically caused by an attacker flooding a website with huge amounts of traffic or requests, in an attempt to overwhelm its systems and take them offline.
A more advanced DoS form is a distributed denial-of-service(DDoS) attack, through which an attacker takes control of several computers to overload its target.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Man in the middle attacks

A

MITMattacks enable a malicious actor to position themselves between the target victim and an online service the user accesses. An example of this is an attacker creating a spoofed, free-to-access Wi-Fi network. When the user connects to or signs into the network, the attacker can steal the login credentials and data they use while on it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q
A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly