Security Threats Flashcards
(50 cards)
What is a passive attack?
A passive attack is where someone monitors data travelling on a network and intercepts sensitive information.
Best defense against passive attacks is data encryption.
What tools do hackers use for passive attacks?
Network-monitoring hardware and software such as packet sniffers.
How are passive attacks detected?
Passive attacks are hard to detect as the hacker is quietly listening.
What is an active attack?
An active attack is when someone attacks a network with malware or other planned attacks.
How are active attacks detected?
Active attacks are more easily detected.
What is the main defense against active attacks?
A firewall.
What is an insider attack?
An insider attack occurs when someone within an organisation exploits their network access to steal information.
What is a brute force attack?
A type of active attack used to gain information by cracking passwords through trial and error.
What methods do brute force attacks use?
Brute force attacks use automated software to produce hundreds of likely password combinations.
What are simple measures to reduce the risk of a brute force attack?
- Locking accounts after a certain number of attempts
- Using strong passwords
What is a denial-of-service attack (DoS)?
A DoS attack is where a hacker tries to stop users from accessing a part of a network or website.
How do most DoS attacks operate?
By flooding the network with useless traffic, making it extremely slow or completely inaccessible.
What is malware?
Malware is software that can harm devices and is installed without the user’s knowledge or consent.
What are typical actions of malware?
- Deleting or modifying files
- Scareware
- Locking files
- Spyware
- Opening backdoors
What is scareware?
Scareware tells the user their computer is infected to scare them into following malicious links or paying for fixes.
What is ransomware?
Ransomware encrypts files on a computer and demands payment for a decryption key.
What does spyware do?
Spyware secretly monitors user actions, such as key presses, and sends information to the hacker.
What are rootkits?
Rootkits alter permissions, giving malware and hackers administrator-level access to devices.
How can malware access your device?
- Viruses
- Worms
- Trojans
What is a virus?
A virus attaches itself to certain files and spreads when users copy infected files.
How do worms differ from viruses?
Worms self-replicate without any user help, exploiting weaknesses in network security.
What is a Trojan?
A Trojan is malware disguised as legitimate software that users install unknowingly.
What is a common reason for security threats in organizations?
Failure to properly secure their network, such as forgetting to encrypt data or using bad code.
Who is often considered the weak point in secure systems?
People