1.4.1 Threats to Computer Systems and Networks

Cards (22)

  • What is malware?
    Malware is a piece of software/code/program that replicates itself and causes damage.
  • How can malware be prevented?
    By running anti-virus/anti-malware software and avoiding unknown downloads and links.
  • What does spyware do?
    Spyware records actions/key presses and sends this data to a third party for analysis.
  • What is ransomware?
    Ransomware prevents access to files unless a ransom is paid.
  • What are the different types of malware and their descriptions?
    • **Viruses**: Programs embedded within other files that replicate and cause damage.
    • **Worms**: Standalone programs that spread through emails.
    • **Trojans**: Malware disguised as legitimate software that deceives users into installation.
    • **Spyware**: Monitors user activities and sends information to hackers.
    • **Ransomware**: Blackmails users for payment to regain access to files.
  • What are the effects of malware on computer systems?
    Malware can delete/corrupt files, change data, prevent access, replicate, record keypresses, steal data, and slow network speed.
  • What are the methods to prevent malware?
    • Use anti-spyware
    • Use anti-malware
    • Use anti-virus
    • Implement a firewall
  • What is social engineering in the context of computer security?
    Social engineering refers to exploiting human behavior as a weak point in security systems.
  • What is phishing?
    Phishing is an email scam that directs users to a fake website to collect personal data.
  • How can phishing be prevented?
    By implementing network policies, firewalls, and educating users about unknown links.
  • What is pharming?
    Pharming involves installing code that redirects users to fake websites to collect personal data.
  • How can pharming be prevented?
    By using anti-malware, firewalls, and checking web addresses for validity.
  • What are the countermeasures for staff being the weak point in security?
    • Prevent external devices from being used on the network.
    • Block access to insecure websites.
    • Restrict access to USB ports, email, internet, and printing.
  • What is a brute-force attack?
    A brute-force attack is when a program tries all possible combinations of characters to find a password.
  • What are the effects of a brute-force attack?
    It can gain access to accounts, edit or delete data, install malware, and block access to accounts.
  • What are the methods to prevent brute-force attacks?
    • Use a firewall
    • Set a limit on password attempts
    • Implement strong passwords
    • Use two-step verification
  • What is a denial of service attack?
    A denial of service attack prevents a server from performing tasks by bombarding it with requests.
  • How can denial of service attacks be prevented?
    By using a proxy server or firewall.
  • What is data interception and theft?
    Data interception and theft occur when data is intercepted during transmission using a packet sniffer.
  • How can data interception and theft be prevented?
    By using encryption.
  • What is SQL injection?
    SQL injection is when SQL code is entered as data input, causing errors or unintended operations.
  • How can SQL injection be prevented?
    By using network forensics and suitable form validation.