Network Threats

Cards (39)

  • What is malware?
    Harmful program damaging computer systems
  • How does a virus spread?
    By attaching to infected files
  • When is a virus activated?
    When opened by a human
  • What can a virus do once activated?
    Change data or corrupt the system
  • How does a worm spread?
    By finding weaknesses in software
  • What is a key difference between a worm and a virus?
    A worm does not need human interaction
  • How quickly can a worm spread?
    Very quickly across a network
  • What is a trojan?
    Harmful program disguised as legitimate software
  • What does a trojan provide to an attacker?
    Backdoor access to the system
  • Do trojans self-replicate?
    No, they do not self-replicate
  • What does spyware do?
    Records user activities secretly
  • What information does spyware aim to record?
    Usernames, passwords, and credit card info
  • What is a keylogger?
    Records key presses of a user
  • How can keyloggers be installed?
    Downloaded or plugged into USB port
  • What does ransomware do?
    Locks files using encryption
  • What do attackers demand in ransomware attacks?
    Money to decrypt the data
  • Why is it difficult to trace ransomware attackers?
    They use digital currencies like bitcoin
  • What is SQL used for?
    Manipulating data in databases
  • What is an SQL injection?
    Malicious SQL query entered into a website
  • What can an SQL injection allow an attacker to do?
    Gain unauthorized access to a database
  • How does a DoS attack work?
    Overloads a server with requests
  • What is the impact of a DoS attack?
    Slows the system and may take websites offline
  • What is a DDoS attack?
    Coordinated attack using a botnet
  • How does a botnet function?
    Controls a large group of infected devices
  • What is a brute-force attack?
    Tests every possible password combination
  • How can a brute-force attack be sped up?
    By using multiple computer systems
  • What is social engineering?
    Tricking others into revealing personal data
  • Give an example of social engineering.
    Impersonating an IT technician via email
  • What is data interception?
    Copying data packets by a third party
  • What software is used for data interception?
    Packet sniffers
  • What are the types of malware discussed?
    • Virus
    • Worm
    • Trojan
    • Spyware
    • Keylogger
    • Ransomware
  • What are the characteristics of a virus?
    1. Replicates itself
    2. Attaches to infected files
    3. Activated by human interaction
  • What are the characteristics of a worm?
    1. Replicates itself
    2. Spreads through software weaknesses
    3. Does not need human interaction
  • How do spyware and keyloggers work?
    • Spyware records user activities secretly
    • Keyloggers record key presses and send data
  • How does ransomware operate?
    • Locks files using encryption
    • Demands money to decrypt data
  • What is the difference between DoS and DDoS attacks?
    • DoS: Single source attack
    • DDoS: Coordinated attack using multiple sources
  • What are the methods of preventing vulnerabilities?
    • Regular software updates
    • Strong password policies
    • User education on security threats
  • What are the impacts of a DoS attack?
    • Slows system performance
    • May take websites offline temporarily
  • What is the role of packet sniffers?
    • Intercept and analyze data packets
    • Used by attackers to gather information