System Security and Software Flashcards

1
Q

Different forms of attack

A

malware
phishing
brute force
denial of service
data interception and theft
SQL injection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Malware def

A

Software written to infect computers and commit crimes
e.g fraud, identity theft

They xploit vulenrabilites in OS software.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Malware examples

A

Virus
Worm
Trojan
Spyware
Adware
Ransomware
Pharming

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

what are viruses and worms

A

Virus: program hidden within another program/file, designd to cause dmg to file systems

Worm: independent self replicaing program that spreads itself between multiple connected systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

what are torjan and spyware

A

trojan: software that causes damage or allows access for criminals to use the device

Spyware: software that secretly passes info to a criminal without users knowledge.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

what is adware and ransomware

A

Adware: displays targeted adverts and redirects search requests without permission

Ransomware: software that locks access to a users system until a ransom is paid

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

pharming def

A

redirecting of a users website by modfiying their DNS entries to a fraudulent site without their permission

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

phishing

A

fraud technique.
designed to get you to give away personal info.

achieved by disgusinig themselves as a trustworthy source in an electronic communication e.g email, fake website

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

brute force attack

A

trial by error method used by programs to decode encrypted data such as passwords and keys

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

denial of service attack

A

flooding a server w/ useless traffic cuasing server o overload and crash. comes from one device.

distributed denial of service attack comes from multiple deivces. these devices are compromsed systems infected with a trojan.

dos attacks have exploited limitations in TCP/IP stack.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

data intercpetion and theft

A

an attacker monitors data streams to and from a target in order to gather sensitive info

can use technique claled ‘sniffing’ - act of monitoring traffic on network to pick out unencrypted passwords and configuration info

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

SQL injection

A

code injection technique used to attack data driven apps

makes use of vulnerabilities in poorly coded database apps

code entered into text boxes and eecuted by server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

social engineering

A

using people as the ‘weak point’ in secure systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

threats posed to networks: malware

A

files are deleted, become corrupt or are encrypted
computers crash, reboot spontaneously and slow down
internet connections become slow
keyboard inputs are logged and sent to hackers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

how do infections psread quickly on networks

A

client is infected, malware then infects the server, then all other clients

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

threats posed to networks: phishing

A

accesing a victim account to withdraw money or purchase things
open bank accounts and credit cards, cashing illigitmate cheques
gai access to high value coroprate data
financial services can blacklist the company, resulting in dmg to brand reputation

17
Q

threats posed to networks: brute force atacks

A

theft of data
access to coroprate systems

18
Q

threats posed to netowrks: denail of service attacks

A

loss of access to a service for customers
lost revenue
lower productivity
damage to reputation

19
Q

threats posed to networks: data interception and theft

A

usernames and passwords compromised allowed unauthroised acccess to systems
discloure of coroprate data
theft of data

20
Q

threats posed to networks: sql injection

A

contents of databases can be output, revealing private data
data in database can be amended or deleted
new rogue records can be added 2 database

21
Q

threats posed to networks: people as a weak point

A

many system vulnarabilites caused by ppl being careless:
not installing OS updates
not keeping anti-malware up to date
not locking doors to computer rooms
not logging off or locking their comp
leaving printouts on desks
writing paswords down on sticky notes attached to comps
sharing passwrds
losing memory sticks/laptops
not appling security to wireless networks
not encrypting data

22
Q
A