Unit 5.3 - cyber security Flashcards
(11 cards)
What does it mean when a computer system has a vulnerability + consequences?
There is a weakness in the system that allows unauthorized individuals to access it.
This can have consequences such as loss of data, loss of availability to systems, identity theft, financial implications, loss of confidence among stakeholders.
Name 7 different malware + definition
Hostile intrusive software written to infect computers and commit crimes.
1. Worms - automated, self-executing, self-replicating programs which spread quickly and exploit weaknesses in network security
2. Virus - like worms but not self-executing; requires human assistance in spreading. Often hidden in other applications/files
3. Trojan - disguised as legitimate software. When installed, can do harm like install back doors, initiate attacks, install other malware, etc.
4. Ransomware - victims’s files on computer are encrypted, and hacker forces them to pay to access them
5. Spyware - secretly obtains personal information on victim’s computer and sells it to advertisers, data firms, etc.
6. Rootkit - malware designed to remain hidden/unnoticeable on computer. May give attacker remote access to system
7. Adware -
What is a brute-force attack + how to prevent?
Automated, trial and error method used to decode encrypted data or using data known about user (e.g. birthday, pet, etc).
Prevent by having long password with mix of symbols; using 2 factor authentication; don’t reuse passwords
What is data interception + how to prevent?
Monitoring data streams to and from target to obtain confidential information. Any data transmitted over a network can be intercepted. Typically uses software called packet sniffer.
Prevent by using end-to-end encryption when transmitting data over a network.
What is a DDoS + how to prevent?
A distributed denial of service attack attempts to disrupt normal traffic of server/network by overwhelming/flooding it with Internet traffic. This can knock the server/network offline due to strain on bandwidth, CPU and other resources. Usually carried out by thousands of computers.
Not preventable but have systems and firewalls that detect DDos attacks which reduce its effects by directing traffic to other servers.
What is hacking?
Any unauthorized access to a system for criminal purposes
What is social engineering?
The use of manipulation to get people to give up personal information. Exploiting and tricking people is often easier than finding weaknesses in computer systems.
What are 9 types of social engineering?
- Baiting - leaving malware infected device (USB drive) in place where it is likely to be found and used.
- Pharming - sends/redirects user to fake website by hijacking the DNS
- Phishing - sending legitimate-looking emails in hopes of getting personal information. Spear phishing targets a specific individual
- Vishing - over the telephone
- Dumpster diving - going through bins to find personal information like phone numbers, access codes, etc.
- Piggybacking/tailgating - walking into secured building by following someone with access
- Watering hole - compromising group of people by infecting a website they use regularly
- Quid pro quo - call employees of a company pretending to be tech support offering to help fix an issue, and gather information in the mean time
- Scareware - tricks user into believing they installed malware/illegal data, hackers offer to come fix it, download actual malware
State 8 methods of protecting digital systems
- Controlling access levels - protects sensitive data and minimizes misuse by only giving people access to the systems they need for work
- Anti-malware software - keeps computer & files safe from malware. Most operating systems have built-in anti-malware
- Authentication - 3 methods: username & password; biometrics (fingerprints, retina scan, etc); 2 step verification(2 separate authentication methods performed one and another)
- Automatic software updates - popular software is often target of attacks. Applies patches & bug fixes; product is is kept up to date and security flaws are fixed ASAP without need for manual intervention
- Firewalls - piece of software/hardware or both configured to only let certain traffics through. unwanted traffic is not allowed onto LAN
- Privacy settings - designed to limit who can view & access your content; e.g. do not track, privacy browsing
- Proxy servers - separate intermediate device between user and remote web server that traffic must pass through; gateway between the browser & the Internet.
- SSL - secure socket layer security protocol provides secure communication channel between 2 devices. Used to secure credit card transactions & data transfer.
How to catch phishing e-mails?
- If they are unexpected or contain instructions to click link/download attachment
- poor spelling and urgent, pressuring tone
- generic greeting
- demanding taking action now
- check URLs of links attached as well as protocol
- links hidden behind text or images
What are 4 functions of proxy servers?
Allows traffic to be filtered/blocked, keeps user IP address secret, caches frequently used websites. reduces impact of DDOS attack