Topic 5 Flashcards
(53 cards)
what is social engineering?
art of manipulating or ‘conning’ individuals into giving away private information or login IDs and passwords
common techniques of social engineering
phishing
shoulder surfing
what is phishing
A phishing email is one that tricks you into handing over sensitive or personal information.
You receive what looks like a legitimate email,(for example from a bank or an organisation such as PayPal or eBay)
The website urges you to visit a bogus website and enter your personal details, which are then captured by the phishers
when are phishers successful
when the user that receives the email click the link
how to recognise phishing email
greetings, email address,forged link, request for personal information, sense of urgency and poor spelling and grammar
how to prevent phishing
use spam filter and don’t open if not sure
what is pharming
threat that tricks users into divulging private information,by clicking the link the download of a malicious code is triggered that will redirect the user to a a fake website
what is shoulder surfing
direct observation of a user entering their security details
forms of cyber attacks
planting viruses, acquiring and using personal or confidential data and disrupting a website or service
Brute force attacks
a hacker may go through a list of different passwords until access to an account is gained
Alternatively, the attacker may try every combination of characters until the correct password is found
security methods
spam filters, antivirus, biometrics device, two-factors verification, encryption, firewall, anti-malwares
what does firewall do
checks ingoing and outgoing network traffic
features of internet
A worldwide collection of interconnected networks.
Relies on physical infrastructure that allows networks and individual devices to connect with other networks and devices.
feature of WWW
WWW is only part of the internet that users can access using a browser..
Based on the HyperText
Transfer Protocol - HTTP (5.1.3)
A way of accessing information using the internet.
what can users do on the internet, what does url do
send receive emails
Uniform resource locators (URL’s) are used to specify the location of web pages.
HTTP
Hypertext transfer protocol
what is WWW
collection of multimedia web pages and other information on websites.
how are URLs used in WWW
specify the location of web pages.
Eg .co.uk .gov .edu .sch .co.fr .co.fr .com
how cac computers comunicate with each other
follow set f protocols,
IP TCP, HTTP(S)
IP
internet protocol
A protocol to route the packets
Each device on the internet has an IP address that uniquely identifies it from all other devices
TCP
transmission control protocol
Splits the messages sent across the internet into smaller pieces called ‘packets’
Assembles the packets in the correct order at the receiver end
search engine
A type of website that allows you to look up information on the World Wide Web.
websites
A series of web pages located on the internet. They are often written in a programming language called HTML(hypertext markup language), and frequently contain text and images
web server
A machine located on the internet that holds website pages