Malicious software that harms computer system or steals data.
Describe a virus:
It is attached to a file - it damages, changes, deletes files and are often downloaded from the internet or emails.
Describe a worm:
It doesn't need to be attached to another file - enters through system security gaps and tricks the user into running them.
Describe a trojan horse:
Appears to be a legitimate program, but is trying to steal/delete data - for example, a fake anti-virus program.
Describe a ransomware:
Takes files hostage by encrypting them so they are unreadable - ransom is asked for by hackers before they'll decrypt them.
Describe a spyware:
Monitors what you are doing on your computer and can send information to criminals - for example, a key logger can note the passwords you type in.
What is social engineering?
Tricking people into making mistakes that give away data or make access to networks easier.
What are examples of social engineering?
Phishing, pharming, shoulder surfing, and more.
What are examples of malware?
Viruses, worms, trojan horses, ransomware, and spyware.
What is phishing?
Getting user to reveal important details such as bank passwords - usually from emails that pretend to come from legitimate sources.
What is pharming?
Software that redirects users to a fake website that can steal authentication details when user tries to log in - normally done via viruses.
What is shoulder surfing?
Watching someone enter a password without them knowing and then using it to enter a system.
What are brute forceattacks?
Trial and error methods of gaining access.
What is an example of a brute force attack?
Trying to work out someone's password by making a computer generate and try different passwords.
What is a botnet?
A network of computers that hackers secretly have control over.
How are botnets formed?
Computers are infected with malware so they can be forced to secretly do tasks for hackers.
How can botnets be used?
In sending phishing or spam emails, or carrying out DDOS attacks.
What does DDOS stand for?
Distributed denial of service.
What do DDOSattacks do?
They stop websites from loading.
How are DDOS attacks carried out?
Bot computers are used to send repeated requests for data to a website - this overwhelms sever traffic so it won't load for any users.
What is the purpose of DDOS attacks?
To export money to stop the attack, or to harm business productivity, or even for political reasons.
What are physical threats?
Data being physically stolen or damaged.
What are examples of physical threats?
Theft of devices such as USB sticks, or damaging the hardware so data is deleted or corrupted.
What is SQL?
Structurequery language.
What is a SQL injection?
A type of attack that involves inserting and executing malicious SQL statements to find data - usually written into search bars are forms on websites.
What is SQL?
A programming language written to search for, add to and change records - it is used for searching in a database of information for particular records and is commonly used in websites.
What is the purpose of SQL injections?
To gain access to important data such as credit card details.
What is data interception / theft?
Finding data whilst it is travelling around and between networks and stealing it.
How may data interception or theft be carried out?
In insecure Wi-Fi networks, or in the ethernet by tapping cables, or physically stealing USB sticks.
What is packet sniffing?
Hackers monitor network traffic to find data worth stealing - inspecting packets to see what sort of data they hold so they only steam useful things.
What are network forensics?
Forensic investigations of networks and attached devices.
Why are network forensics carried out?
To figure out where weaknesses are by examining data packets sent - what they contain and where they are going - as they can be used to gather legal evidence and detect intrusions.
What is penetration testing?
Attempting to hack a network to identify flaws so they can be fixed.
What are anti-malware software?
Software used to prevent malware from entering the system.
What are the functions of anti-malware?
Quarantine
Downloads
What is quarantining?
Malware found on system being quarantined to prevent it from being ran.
What do anti-malware do to downloads?
They scan files being downloaded for threats against a database of known threats.
What is a drawback of anti-malware?
They must be kept up to date as new malware are being produced all the time.
What is a firewall?
A software or hardware that provides a barrier into your computer system.
How do firewalls work?
Only requested traffic can enter the system, which stops unwanted access such as hackers spying on your system - they also scan incoming and outgoing data packets and compare them to rules to decide what to do with them.