Security Threats Flashcards

(50 cards)

1
Q

What is a passive attack?

A

A passive attack is where someone monitors data travelling on a network and intercepts sensitive information.

Best defense against passive attacks is data encryption.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What tools do hackers use for passive attacks?

A

Network-monitoring hardware and software such as packet sniffers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

How are passive attacks detected?

A

Passive attacks are hard to detect as the hacker is quietly listening.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is an active attack?

A

An active attack is when someone attacks a network with malware or other planned attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

How are active attacks detected?

A

Active attacks are more easily detected.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the main defense against active attacks?

A

A firewall.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is an insider attack?

A

An insider attack occurs when someone within an organisation exploits their network access to steal information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is a brute force attack?

A

A type of active attack used to gain information by cracking passwords through trial and error.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What methods do brute force attacks use?

A

Brute force attacks use automated software to produce hundreds of likely password combinations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are simple measures to reduce the risk of a brute force attack?

A
  • Locking accounts after a certain number of attempts
  • Using strong passwords
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is a denial-of-service attack (DoS)?

A

A DoS attack is where a hacker tries to stop users from accessing a part of a network or website.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

How do most DoS attacks operate?

A

By flooding the network with useless traffic, making it extremely slow or completely inaccessible.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is malware?

A

Malware is software that can harm devices and is installed without the user’s knowledge or consent.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are typical actions of malware?

A
  • Deleting or modifying files
  • Scareware
  • Locking files
  • Spyware
  • Opening backdoors
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is scareware?

A

Scareware tells the user their computer is infected to scare them into following malicious links or paying for fixes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is ransomware?

A

Ransomware encrypts files on a computer and demands payment for a decryption key.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What does spyware do?

A

Spyware secretly monitors user actions, such as key presses, and sends information to the hacker.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What are rootkits?

A

Rootkits alter permissions, giving malware and hackers administrator-level access to devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

How can malware access your device?

A
  • Viruses
  • Worms
  • Trojans
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What is a virus?

A

A virus attaches itself to certain files and spreads when users copy infected files.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

How do worms differ from viruses?

A

Worms self-replicate without any user help, exploiting weaknesses in network security.

22
Q

What is a Trojan?

A

A Trojan is malware disguised as legitimate software that users install unknowingly.

23
Q

What is a common reason for security threats in organizations?

A

Failure to properly secure their network, such as forgetting to encrypt data or using bad code.

24
Q

Who is often considered the weak point in secure systems?

25
What is social engineering?
A method of gaining sensitive information or illegal access to networks by influencing people.
26
How does social engineering typically occur over the telephone?
A caller pretends to be a network administrator and persuades an employee to disclose confidential information.
27
What is phishing?
A form of social engineering where criminals send emails or texts pretending to be from a legitimate business to steal personal information.
28
What do phishing emails often contain?
Links to spoof versions of a company's website requesting personal information.
29
What features do many email programs and browsers have to combat phishing?
Anti-phishing features
30
What are some giveaways that an email might be a phishing attempt?
Poor grammar and requests to follow links or update personal details.
31
What are SQL injections?
Pieces of SQL typed into a website's input box that can reveal sensitive information.
32
What does SQL stand for?
Structured Query Language
33
How can SQL injections exploit weak input validation?
By entering SQL code that allows access to more data than intended.
34
What could happen if a website's SQL code does not enforce strong validation?
Hackers can access sensitive information from the database.
35
Fill in the blank: SQL injections can give criminals easy access to _______.
insecure data
36
What is an example of an SQL injection attack?
Entering '12345 OR 1=1' instead of a valid PIN.
37
True or False: SQL injections can bypass a website's firewall if the SQL code is insecure.
True
38
What is the consequence of executing an SQL injection like 'SELECT name, address, account number WHERE pin = 12345 OR 1=1'?
It shows the details of everyone on the website's database.
39
What is the role of input validation in preventing SQL injections?
It ensures only valid input is processed to prevent unauthorized access.
40
What is the purpose of a good network policy?
To regularly test the network, use passwords, enforce user access levels, install anti-malware and firewall software, and encrypt sensitive data. ## Footnote A good network policy helps in identifying and fixing security weaknesses and preventing unauthorized access.
41
What is penetration testing?
A method where organizations employ specialists to simulate potential attacks on their network to identify weaknesses. ## Footnote Results of the pentest are reported back for further action.
42
What is the role of network forensics?
To investigate the cause of cyber accidents or attacks by capturing and analyzing data packets. ## Footnote This analysis helps in understanding how the network was attacked and in preventing future attacks.
43
How do passwords help in network security?
They prevent unauthorized users from accessing the network and should be strong, long, and changed regularly. ## Footnote A strong password typically includes a combination of letters, numbers, and symbols.
44
What are user access levels?
Controls which part of the network different groups of users can access. ## Footnote Higher access levels allow users, like business managers, to access sensitive data and modify permissions.
45
What is anti-malware software designed to do?
To find and stop malware from damaging an organization’s network and devices. ## Footnote Includes antivirus programs that isolate and destroy computer viruses.
46
What is the function of firewalls?
To block unauthorized access by examining all data entering and leaving the network. ## Footnote Firewalls help in preventing potential threats to the network.
47
What is encryption?
The process of translating data into a code that can only be accessed by someone with the correct key. ## Footnote Encrypted data is known as cipher text, while unencrypted data is plain text.
48
Why is encryption essential?
It ensures secure transmission of data over a network. ## Footnote Encryption protects sensitive information from unauthorized access during transfer.
49
Fill in the blank: Encrypted text is called _______.
cipher text
50
Fill in the blank: Data which has not been encrypted is called _______.
plain text