Unit 4 Flashcards

(30 cards)

1
Q

What is malware and 2 types

A

Malicious Software are executable programs which run on a computer and causes harm to things like data

VIRUS:

Replicate their code in other programs
Infect other computers
Harm computer by deleting/corrupting/modifying files

WORM

Cause no damage to attacked computer
Slows down computers/networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the different forms of malware

A

Trojan Horse - Where malware is disguised as something the user wants (ie: a cracked game)

Ransomware - Software which holds a computer hostage and by locking/encrypting access to it. Once a ransom is paid to the attacker then the access is restored

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is social engineering

A

The ability to obtain confidential information by asking for it (ie: scamming)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is shoulder surfing

A

The ability to get info/passwords by observing as someone types them in

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is phishing and what to look out for

A

A type of social engineering when someone sends an email/text/phone call to obtain personal information

WHAT TO LOOK OUT FOR

No personalised greeting
Senders address is often a variation off a genuine address
Forged link
request for personal information
Sense of urgency
Poor SPaG

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is DOS and DDOS attack

A

Denial of service attack where a hacker sends many fake requests to a server at once (flood) so it cannot interpret the real requests fast enough and may just go offline

In DDoS attack (distributed) many computers are used to send requests

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is MITM attack

A

Man in the Middle attack is where a hacker interprets communications between a user and server so they can

Eavesdrop to find personal info
add different info to a web page/other communication such as emails

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

How to preven data theft

A

**Use a strong password

Make sure data is encrypted

dont follow suspicious links (i.e., links in emails)**

Think before you post personal details

dont install apps without research

Delete all info on the device before discarding it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are the types of attaks that can be used against your network

A

Brute force attack

SQL injection

DoS attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is an SQL injections

A

Using web forms to add SQL instructions to a query that can cause data loss or revealing of personal info

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is penetration testing and what are the goals

A

deliberately hacking into your own system to find security holes

GOALS:

Identify targets of potential attacks

identify possible entry points
attempt to break in

report back findings

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Black box and white box testing

A

Black box testing

testers are given no more information than a potential hacker

White box testing:

testers are given as much information as an ‘insider’ would have, in order to determine how much damage a rogue employee could do

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are 3 hats shown in ethical hacking

A

Black hat hackers

Hack for criminal intent

White hat hackers

Ethical hackers employed to find system vulnerabilities before any black hat abuses them and get rewarded

Grey hat hackers

Hack without consent to find system vulnerabilities and won’t do anything with it themselves but might send out a ransom or they would broadcast the information on the Internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What data is shown in an audit trail and who can use it to their advantage

A

Who attempted access
What did they do
Where did they look
When did they do it
Why did they do it

Network forensics can use this to their advantage to solve data mysteries

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is a network policy and an example

A

A user policy that is used to make sure nothing bad happens on a network (ie: an AUP (Accept User Policy)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are the methods used to protect data and their features

A

Anti Malware Software

Prevents malware from being opened on your computer

Firewall

Software which checks incoming data from internet/network and will block it if its harmful
Only certain packets that meet set filtering rules are allowed to pass through

User Access Levels

Software which allows different users to access/view/edit data depending on the user

Encryption

Encoding data so it can’t be understood

Physical security

Hardware used to protect data/information from someone (ie: CCTV cameras)

17
Q

What is the need for a UI

A

Without it we would have to use binary to communicate so the UI gives us an easy way to communicate with the PC

18
Q

5 types of UI with examples + features

A

GUI (Graphical user interface)

WIMP (windows icons menus pointer) in Windows

Users can click on icons with pointer

Menu Driven interface

ATMs

It is less prevalent but still exists

CLI (Command Line Interface)

command prompt

All commands must be typed in as text

no graphics

quicker for experts

doesn’t take ram

Voice activated

Siri

Real Time

Sensors detecting inputs

19
Q

What is the use of memory mansgement

A

To run an app, the PC must copy the program into the main memory from storage

OS keeps a record of where each program is stored so it doesn’t overwrite existing programs

20
Q

Whats an interrupt, hardware and software and give examples

A

signals sent to CPU by external devices to indicate an event needs action so the CPU stops what its doing to notify the user

Hardware interrupt is generated by hardware devices (ie: Printer out of paper)

Software interrupt is generated by programs (ie: divide by 0 error)

21
Q

What is a peripheral and how does the os manage it (likr a printer)

A

You will need to install a device driver first which is what the OS uses to communicate with the peripheral (all devices outside CPU)

For printers the computer sends data to a printer buffer which is where all the requests wait to be printed

22
Q

How does the OS do disk/file management

A

the OS:

manages where on the disk files are written
keeps track of where they are so they can be retrieved
Makes sure no file overwrites another

23
Q

How does OS manage user management

A

OS organises user login/passwords

It will also manage access rights and may include encryption of some files

24
Q

What are all the functions of an OS

A

Provides a UI
Memory management
Multitasking
Disk/Peripheral management
User management/security
File management

25
What are utility software abd give examples
Provide extra functionality which make it easier to use Encryption software defragmentation software data compression software
26
Use of encryption software
Used to transform text so it can't be read without knowing the key
27
What is disk disgragmentation
When a large file is saved on your PC it might not save in consecutive memory locations (fragmented file) Retrieving data needs more processing more processing = less performance Defragmenting reorders the files so they are all in the same order Less procession = more performance Free space is in one place so new files dont need to be fragmented
28
What are data compression software and their uses
Used to (de)compress files/folders reduces bandwidth usage and data consumption to download/send a whole file Can enable files to fit within a strict limit Increases amount of free data on disk
29
Why is backup/recovery useful
In the case of accidental or malicious damage (ie: natural disasters) there will be a backed up version of the data
30
What is full and incremental backups and a good routine for them
Full Complete backup of everything which can be restored independently of any other backup Takes larger time/disk space to backup Incremental: records only changes since last backup A chain of backups is required to fully restore files Monday - Saturday incremental and Sunday Full