Network Threats, Attacks and Preventions Flashcards

(38 cards)

1
Q

What two words does malware consist of

A

Malicious
Software

Malicious software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is malware

A

Harmful computer programs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are four types of malware

A

Computer Virus
Ransomware
Trojan Horse
Worm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is a Computer Virus

A

These infect computers by replicating the code in other programs, along with infecting other computers.

They also deal harm to the computer by deleting, modifying and accessing files

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is a Worm

A

A virus that replicates itself to cause damage to other computers.

These type of malware don’t deal damage to harmed computers and instead slows them down, and slows down the network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is a Trojan Horse

A

These type of viruses have programs, games or cracked files that users may commonly want. In reality, it is a negative program code causing damage, take controls or provides unlimited access to the computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is ransomware

A

A malware type which holds a computer hostage by locking or encrypting access to it. Due to encrypted data, no one can access it, not even a cyber security professional is able to unlock the data unless there’s available backups. To be granted access, we may be forced to pay the ransom a high price

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is exploiting

A

Taking advantage of a vulnerability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are the two types of exploiting technical vulnerabilities

A

Unpatched software
Out of data anti malware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is unpatched software

A

If software updates and security updates aren’t installed, software will be vulnerable to malicious activity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is out of data anti malware

A

When software such as antivirus isn’t regularly updated, it is unable to detect the latest viruses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is confidential

A

A set of rules

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is social engineering

A

Ability to obtain confidential information by asking for it.

This is a type of confidence trick that con artists specialise in

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is shoulder surfing

A

Ability to get information or passwords by observing as someone types them in

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is phishing

A

A type of messaging scam done by many con artists.

This type of fraud scheme is when emails, texts or phone calls are sent back to users, pretending to be from a bank or website. Phishing scammers will go to extreme lengths to get what they want.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are six things you need to identify before going through an action sent in an email

A

Greetings: Phishing emails won’t specify your name, just an email address, so not a friendly greeting

The sender’s address: Variation on a genuine request

Forged links: Links may look genuine, but it won’t look like the website given

Personal information requests: Normally, emails never do this. If they ask for this, a con artist has written this

Sense of urgency: Con artists often reply with comments saying that if you don’t do a specific action, a bad thing is going to happen

Poor spelling and grammar: Con artists worry so much about what they get from you, they forget about what they give to you

17
Q

What is a D DoS attack

A

A type of attack where hackers will use or infect a computer, so it sends as many requests as it can to the server, if it has a poor connection and is offline

18
Q

What is an MITM attack

A

Man in the middle attack

In this attack, MITM allows the attacker to intercept communications between the user and the server. Attacks can eavesdrop to find passwords and personal information, so they can add new information to web pages or other communication used

If a hacker connects to an unencrypted WiFi connection, it makes it easier to from an MITM attack

19
Q

What is a Brute Force Attack

A

This is a common type of attack done where hackers will enter every single possible password combination, and will not stop until they get in.

20
Q

What is an SQL attack

A

Structured Query Language Injection

This is a database query language. SQL injection takes advantages of web inject forms for data access to then destroy the data.

SQL commands can be input into web forms instead of expecting “real data”. This is interpreted by vulnerable web applications and ends up causing damage or releasing personal information

21
Q

What is data interception and theft

A

Steals data or intercepts it with an MITM attack

22
Q

What are ways we can use to prevent vulnerabilities and network threats

A

Penetration testing
Physical security
Firewalls
User Access Levels
Anti malware software
Antivirus software
Passwords
Encryption

23
Q

What is encryption

A

A unique way of decoding data so it cannot be read or unencrypted unless unlocked by a key

24
Q

How do we encrypt individual files

A

Files are encrypted individually on a computer and can only be viewed by users who have the password

25
How do we encrypt drives
We encrypt ordinary computer drives so that a mandatory password is required for accessing the information. If we use removable media, special hardware can be purchased, which encrypts the data on the hard disk
26
How do we encrypt transmitted data
If a website uses HTTPS, it encrypts the connection to the server. Your web browser will send its key and form data, encrypting it with the server key. The sever encrypts the web page you request using your web browser’s key.
27
What is a password
A special key that locks the data and can only be accessed if we unlock the key.
28
What is antivirus software/ antimalware software
These type of software detect malware, viruses, trojan horses, worms, spyware and ransomware.
29
How does an antivirus/ antimalware software do its job
When a virus or malware is detected, it is sent to the antivirus company. They then verify it is a malware and creates a signature of the virus. It is then added to the virus database and tell computers to run an update. Viruses can also morph to avoid detection. This makes it harder to create a signature
30
What is penetration testing
The practice of deliberately trying to identify security holes in your own systems. What hackers want is attempting to break in, identify targets of potential attacks, identify possible entry points and report back findings
31
What is a firewall
Separates a trusted network from a non trusted network
32
What is the process of a firewall
Data is sent around the network in small packets of information. Packets are checked to know where they are coming from, who it is coming from and who it is going to be sent to. Packets that don't match filtering rules are dropped. This is a packet filter Firewalls are applicable on dedicated hardware or as a software. In short, the function of a firewall is to detect packets from malicious computers
33
What are the benefits of firewalls
Prevents attackers from gaining access to the computer Blocks certain malicious computers by filtering packets from a certain IP address Prevents access to certain ports on the network. This is port blocking Malicious or inappropriate websites are blocked
34
What are drawbacks of firewalls
Dedicated hardware firewalls are expensive Software firewalls slow down a computer
35
What are User Access Levels
Access rights which are set on disks, files and folders
36
What are password policies
A process that many organisations and computer systems use. This makes sure your chosen password has features like Minimum character length At least 1 lowercase letter At least 1 uppercase letter At least 1 symbol At least 1 number Change password per month
37
What is physical security
When software, hardware and networks are protected by real life methods
38
What are examples of physical security methods
Electric fences Barbed wires Thick walls Turnstiles and gates ID cards and signs Locked doors Locked cabinets Security lighting Numerous security guards CCTV cameras Intruder alarms