Module 1 Lecture 6 Flashcards

(21 cards)

1
Q

What can be hacked:

A

Anything with an IP address, anything connected to the internet has an IP address.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Common types of cyber attacks:

A

Malware, phishing, man-in-the-middle attack, denial-of-service attack, SQL injection.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Malware (malicious software):

A

Virus, worms, trojan, adware, spyware, ransomware.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Virus:

A

Specific type of malware, contagious piece of code that infects other software on a host system then spreads itself when its run, mostly known to spread when software is shared between computers. Embedded in a host program, a separate executable application that has been embedded with the virus, virus is activated when the app is run.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Worm:

A

Standalone app. Unlike a virus, it does not need a host application, can easily replicate to other computers, typically more severe than a virus both in how it spreads but also in its impact on files and applications.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Trojan:

A

A type of malicious code or software that looks legitimate but can take control of your computer. Designed to damage, disrupt, steal or in general inflict some other harmful action on data or network. Often comes in email from someone you know.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Adware:

A

Known as advertisement-supported software. Creators of adware include advertisements or help distribute other software to earn money. Ads may be within software itself, adware may encourage you to install additional software provided by third-party sponsors.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Spyware:

A

Unwanted software that infiltrates your computing device, stealing your internet usage data and sensitive information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Ransomware:

A

Type of malicious software designed to block access to a computer system until a sum of money is paid.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Attacks come through either:

A

People, data, or systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

First line of defense; people:

A

Organizations must enable employees, customers, and partners to access information electronically, biggest issue of information security is people not tech.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Authentication and authorization:

A

Authentication is a method for confirming users identities, authorization is the process of giving someone permission to do or have something.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Common methods of authentication:

A

Something the user knows, something the user has, something that is part of the user.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Something the user knows:

A

User ID, password, most common way to identify individual users, most ineffective form of authentication.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Something the user has:

A

Smartphone, USB security key, hardware token.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Something that is part of the user:

A

The best and most effective way to manage authentication, uses biometric identification like fingerprint or face to authenticate.

17
Q

Privilege escalation:

A

A network intrusion attack that takes advantage of programming errors or design flaws to grant the attacker elevated access to the network and its associated data and applications.

18
Q

Data prevention and resistance:

A

One of the most common defenses for preventing a security breach is a firewall, which is hardware or software that guards a private network by analyzing the information leaving and entering the network.

19
Q

Anti-spam protection:

A

Keeps malicious spam out of your mailbox, reduces chance of employee clicking on potentially harmful links, keeps inbox form clutter, false positives, false negatives.

20
Q

Anti-virus protection:

A

Protects malware from getting on your system, detects malware on your computer, stops malware from doing damage, constantly updating.

21
Q

Backup strategies:

A

Local backup, offsite backup, cloud backup, good for fighting cyberattacks.