Security #9.5 Flashcards

(46 cards)

1
Q

What is cybersecurity?

A
  • Range of measures taken to
  • protect computer systems, networks
  • and data from unauthorised access/cyberattack

Lets say:
Ways of protecting PC, networks or data from unauthorised access (cyberattack)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

How are cyberattacks carried out?

A

Malware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is malware?

A

Malicious software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

4 types of malware?

A
  • Viruses
  • Worms
    *Spyware
  • Trojans
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are viruses?

(malware)

A
  • Programs that can replicate themselves
    and be spread from one system to another
  • By attaching themselves to host files
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Use of virus?

(malware)

A

Modify/corrupt info of targeted computer system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are worms?

(malware)

A
  • Self-replicating programs
  • Can identify vulnerabilities in OS
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Use of worm?

(malware)

A

Enable remote control of infected computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is spyware?

(malware)

A
  • Installed by opening attachments/downloading infected software
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Use of spyware?

(malware)

A

Collect stored data without user’s knowledge

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

1 type of spyware?

(malware)

A

Keyloggers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What does a keylogger do?

(spyware)

A
  • Track keystrokes
  • Can capture passwords of accounts

Parents use these ig to monitor children online activity O_o

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are trojans?
+ use

(malware)

A
  • Program appearing to perform useful function
  • But provides a back door

+ Enables data to be stolen

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are the 6 ways of protection against malware

(imo just think of 3 but whatever ya think of first)

A
  • Install virus protection software
  • Use firewall
  • Keep OS up-to-date
  • Use latest ver. of web browser
  • Be aware if phishing emails
  • Malicious software removal tool
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Describe virus protection software

A

AKA anti-virus software

  • Program loaded into mem whilst pc running
  • Monitors activity on pc for signs of virus infection
  • Also always upd these regularly
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

How does anti-virus recognise viruses?

A
  • Virus has its unique ‘signature’
  • Antivirus stores that in database
    *PC scanned if signature in database exist
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Describe firewall

A
  • Software/hardware security system
  • Controls incoming & outgoing network traffic
  • Packets of data analysed, decides if they allowed or not
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Basic function of firewall?

A
  • Monitors:
    where data has come from,
    where it’s going,
    decides if communication is allowed
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

How does the firewall do the basic function?

A

By checkin g a list of pre-defined rules

20
Q

Explain ‘keep your operating system up to date’

A

New way to bypass OS = install security patches issued

21
Q

Explain ‘use latest ver. of web browser’

A

Same as ‘keep your operating system up to date’

Update installed after restarting browser

22
Q

Explain ‘look out for phishing emails’

A
  • Emails ask you to confirm personal details

FAKE AF

23
Q

Describe malicious software removal tool

When should u use it?

A
  • literally just removes the malware
  • use it if you got malware in computer
24
Q

List 6 forms of cyberattacks

(although u could think of 3, u probably might want to know these all)

A
  • Shoulder surfing
    *SQL injection
  • DoS attacks
  • Password-based attacks
    *IP spoofing
    *Social engineering
25
Explain shoulder surfing (cyberattack)
* Using direct observation to get info e.g. guy using ATM machine
26
Explain SQL injection (cyberattack)
* Technique of malicious users, injecting SQL commands into SQL statement, via web page input * Injected SQL commands alter SQL statements * Compromises security of info held in database ( seems a lot to remember )
27
DoS attacks short for? (cyberattack)
Denial of service attacks
28
Explain DoS attacks? (cyberattack)
* Technique used to make website/server unavailable to legitimate users * By swamping system with fake requests * Involves a single internet connection
29
DDoS short for? (cyberattack)
Distributed Denial of Service
30
Explain DDoS attacks? (cyberattack)
* Same as DoS however * Involves multiple connected devices * Distributed across the internet * Causes huge volumes of traffic
31
Explain password-based attacks (cyberattack)
Cyber criminals using ways of finding out ur password
32
What are the 3 types of password-based attacks? (cyberattack)
* Dictionary attack * Brute force attack * Guess
33
Explain dictionary attack (password-based attacks)
* Uses simple file containing words found in dictionary * Uses common words people use as their password
34
Explain brute force attack (password-based attacks)
* Similar to dictionary attack * But able to detect non-dictionary works * Through all possible alphanumeric combinations e.g. aaa1 to zzz10 * Not quick, tho eventually uncovered
35
Explain guess (password-based attacks)
* Passwords aren't random * Likely based upon - interests - hobbies - pet names - family names * A well educated guess often works
36
Explain IP spoofing (cyberattack)
* spoof = hoax = trick * Attacker changes IP address of legitimate host * Visitor who types URL of site * Sent to spoofed web page * Can steal sensitive data/install malware
37
Explain social engineering (cyberattack)
* Involves tricking user to give out sensitive information a good example is tech supporters I mean phishing.
38
3 ways of identifying vulnerabilities in PC?
* Footprinting * Ethical hackings * Penetration testing
39
Explain footprinting (identifying vulnerabilities)
* Involves gathering all info about PC/network/devices attached to it * Enables penetration tester to discover * How much detail at tacker could find out * Allows organisations to limit technical info publicly available
40
Explain ethical hackings (identifying vulnerabilities)
* Needs perms from system owner to do this * Ethical hacker attempts to bypass system security * In search for any weak points to be exploited by malicious hackers * The info used by owner to improve system security
41
Explain penetration testing (identifying vulnerabilities)
* Subset of ethical hacking * Process of testing PC/network to find vulnerabilities * Tests can be automated with software applications/manually
42
What are the 4 penetration testing strategies? (identifying vulnerabilities)
* Targeted testing * External testing * Internal testing * Blind testing
43
Explain targeted testing (penetration testing)
* Carried out by organisations ICT team * Work together ig
44
Explain external testing (penetration testing)
* Find out if an outside attacker * can get in and how far * they can get in once gained access
45
Explain internal testing (penetration testing)
* Estimate how much dmg * dissatisfied employee could cause
46
Explain blind testing (penetration testing)
* Simulate actions and procedures of a real attacker * By severely limiting info given to team performing test