Cyber Security

Cards (22)

  • Cyber security refers to systems put in place to defend computers, web servers, mobile phones and networks from an attack by a cybercriminal.
  • Types of Cybersecurity Threats:
    • Brute force attacks
    • Data Interception
    • Distributed Denial of Service (DDoS) Attacks
    • Hacking
    • Malware
    • Phishing
    • Pharming
    • Social engineering
  • Brute force attacks is a method where all potential combinations are tried to generate a password
  • Data interception is the stealing of data by tapping into a network. Packet sniffers examine all data packets on a network and read the data. War driving is a method that intercepts Wi-Fi signals
  • A DDoS attack is an attempt to prevent anyone from accessing a part of a network. It is flooded with requests to overload and crash it
  • Hacking is when someone gains unauthorized access to a computer system or network
  • Malware is software used to infect computer/device
  • Examples of malware:
    • Viruses
    • Worms
    • Trojan horse
    • Spyware
    • Adware
    • Ransomware
  • Viruses are programs that can replicate themselves with the intention of deleting or corrupting files, or causing the computer to malfunction.
  • Worms are types of viruses that replicate themselves to other computers through networks without any action from the user
  • Trojan horses are malicious program disguised as legitimate software.
  • Spyware is software that gathers information by monitoring the victim and captures personal data
  • Adware is software that floods a user's computer with unwanted advertising.
  • Ransomware encrypts data on a computer so a decryption key is needed. A ransom is charged in order to get that key to decrypt the data
  • Phishing is the sending out of legitimate emails to users to trick them into giving out personal information by pretending to be someone else or a trustworthy source
  • Pharming is when someone redirects you to a fake website to collect information and is code installed in a computer
  • Social engineering is when someone manipulates users into revealing information by pretending to be someone you trust
  • Methods of keeping safe:
    • Access Levels
    • Anti-malware, anti-virus, anti-spyware
    • Authentication
    • Biometrics
    • Automatic software updates
    • Check spelling and tone of communication and URL links
    • Firewalls
    • Proxy Servers
    • Privacy Settings
    • Secure Sockets Layer (SSL)
  • Anti-malware:
    • Detects and removes spyware from HDD/SSD
    • Prevents downloading of spyware
    • Encrypts files and data
    • Blocks access to camera and microphone if suspicious activity detected
    • Scans for signs that user's information is being stolen
  • Firewalls
    • Can be both software or hardware
    • Examine traffic between computer and external network
    • Check if incoming data meets certain criteria
    • Prevent access to undesirable websites and IP addresses
    • Prevent virus and hackers
    • Maintain a log to show acitivity
  • Proxy Servers:
    • Filter internet traffic and blocking access
    • Keep user's IP address secret
    • Block requests from certain IP Address
    • Prevent direct access to a web server
    • Direct invalid traffic away
    • Using cache speeds up access to website
    • Can act as a firewall
  • Secure Sockets Layer (SSL)
    Type of protocol used by computers to communicate securely with each other across networks. When a user logs into a website, it encrypts data