mod 15 chaopter 8 Flashcards
(35 cards)
Q: What is information theft?
A: Breaking into a computer to obtain confidential data.
Q: Give one example of data manipulation.
A: Changing the price of an item in a record system.
Q: What is identity theft?
A: Stealing personal information to impersonate someone.
Q: What is a disruption of service?
A: Preventing legitimate users from accessing services (e.g. DoS attacks).
Q: What is the difference between internal and external threats?
A: Internal threats come from users inside the organization; external threats come from outside.
Q: What is social engineering?
A: Deceiving people to reveal confidential info or perform certain actions.
Q: What is pretexting?
A: Creating a fake scenario to get the victim to share info, often via phone.
Q: What is phishing?
A: Pretending to be a legitimate source via email or text to steal data.
Q: What is vishing?
A: Using voice messages to trick users into calling and revealing info.
Q: What is malware?
A: Malicious software like viruses, worms, and Trojans that harm systems.
Q: How does a virus spread?
A: By attaching to files or programs and requiring user activation.
Q: What is a worm?
A: Malware that spreads on its own through a network.
Q: What is a Trojan horse?
A: Malware disguised as legitimate software.
Q: What is spyware?
A: Software that secretly collects user information.
Q: Are cookies always harmful?
A: No, some cookies help personalize user experiences.
Q: What is adware?
A: Software that collects user data for advertising purposes.
Q: What are popups and pop-unders?
A: Advertising windows that appear in front or behind browser windows.
Q: What is a botnet?
A: A network of infected computers controlled by a hacker.
Q: What is the goal of a DoS attack?
A: To prevent legitimate users from accessing a service.
Q: What does a SYN flood do?
A: Sends fake connection requests to overload a server.
Q: What is a ping of death?
A: Sending oversized packets to crash a system.
Q: What is a DDoS attack?
A: A large-scale DoS attack using multiple infected devices.
Q: How does brute force relate to DoS?
A: It can cause DoS by flooding login attempts or locking accounts.
Q: Why should default usernames be changed?
A: They are commonly known and can be exploited by attackers.