Lesson 2

    Cards (38)

    • Malware is malicious software capable of
      • Providing remote control for an attacker to use an infected machine
      • Corrupting, modifying or deleting data and files on a network
      • Stealing sensitive data
    • signs of malware
      1. A new toolbar appears on your browser
      2. Your homepage has changed unexpectedly
      3. Your computer suddenly runs a lot slower
      1. What are some things you should do to avoid malware?
      Use an antivirus programme to scan that download for malware before opening it.
    • List as many websites/services that you can think of that require a username / password to access
      • Snapchat,
      • Tiktok,
      • Minecraft,
      • Youtube ,
      • Shein
      • Facebook
      • Twitter 
    • Snapchat
      Risks:Personal information being released.
    • Email
      Can see your private messages. 
    • Bank
      Can steal your money and your details.
    • What is a brute force attack? How do they work?

      A brute force attack is a trial and error method  of gaining access to computer systems. 
    • Simple brute attack
      Description: Occurs when hackers attempt to guess the users login details
    • Dictionary attack:
      An intruder attempts to crack a password-protected security system with a “dictionary list”
    • Hybrid attack:
      A kind of cyberattack where the perpetrator blends two or more kinds of tools to carry out the assault.
    • Credential stuffing:
      A cyber attack in which credentials obtained from a data breach on one service are used to attempt to log in to another unrelated service.
      1. Why can brute force attacks be successful?
      Brute attacks will be successful if your passwords are easy to guess.
    • How to make a secure passwordMake a unique password
      Use uppercase letters 
      Be more than 8 characters long.
      Special characters
      Not a common word 
      NO PERSONAL INFO!!!
    • Methods on how to prevent brute force attacks
      Time delay between entering one password and another
      Description: Delays when the user can attempt to log in with an incorrect password/code
    • methods on how to prevent brute force attacks

      Limits to the number of password guesses
      Description: Accounts are locked after several attempts
    • methods to prevent brute force attacks
      Captcha tests
      Descriptions- forces a human to complete a test to see If they are not a bot
    • What does PIN stand for?

      Personal Identification Numbers
    • 19XX and 20XX are very common PIN combinations, why?

      those pins are the persons birth year.
    • What is biometric security?
      It’s software is made to automatically recognise people based on their unique behaviour or biological characterics.
    • Iris/retina scanning - scans the unique patterns of a persons eye
    • fingerprint scanning- scans. the unique patterns of a persons finger
    • Facial recognition- scans the unique features of a person‘s face
    • Voice recognition- scans the unique frequencies of a person’s voice
    • Why might biometric scans be more beneficial than traditional passwords systems?

      Biometric is more unique and less hackers are able to hack it.
    • What is a brute force attack?

      a method of guessing passwords by trying all possible combinations
    • Simple brute force attacks…

      test a large number of random test combinations, consisting of letters, numbers and symbols
    • Dictionary attacks…
      test a large list of common words and phrases
    • Hybrid attacks…
      test a large combination of common words with random text, such as replacing letter in common words with an @ symbol or with numbers
    • Credential stuffing attacks…

      tests a large list of stolen usernames and passwords to login to accounts across a variety of online platforms
    • What makes a password vulnerable to brute force attack?
      being short and simple
    • What is the purpose of a username and password?

      to identify the user and to verify they are who they claim to be
    • A secure password should…

      be a mixture of upper-case and lowercase letter, numbers and characters
    • what type of password attacks would be most successful against against the password T63k#s23A?

      Brute force
    • What is ’rate limiting’, and how does it help prevent brute force attacks?

      it limits the number of login attempts within a certain frame to prevent repeated attempts
    • what is NOT an example of biometric security
      Text passwords
    • What is the purpose of a CAPTCHA test?

      To ensure that a user is a human and not an automated bot
    • Why are CAPTCHAs effective against brute force attacks?

      they prevent automated bots from attempting multiple logins
    See similar decks