computing

    Cards (89)

    • 6 main threats posed to a network
      - Malware
      - Social engineering
      - Brute-force attacks
      - Denial of service attacks
      - Data interception & theft
      - SQL injection
    • what is malware?
      malicious software
    • What are some potential consequences of malware?
      Files being deleted, corrupted or encrypted
    • How can malware affect internet connection?
      Internet connection becoming slow or unusable
    • What is a possible symptom of malware on a computer?
      Computer crashing or shutting down
    • 5 different types of malware
      - virus
      - worms
      - trojans
      - spyware
      - ransomware
    • what is a virus?
      A program which can replicate itself on a user's computer. It contains code that will cause unwanted and unexpected events to occur
    • what kind of issues may a user experience when having a virus on their computer? (three things)
      - Corrupt files
      - Delete data
      - Prevent applications from running correctly
    • what is a worm?
      Worms are very similar to viruses, with the main difference being that they will spread to other drives and computers on the network
    • how cam worms infect other computers? (four things)
      - Infected websites
      - Instant message services
      - Email
      - Network connection
    • what is a trojan (horse)?
      Trojans disguise themselves as legitimate software but contain malicious code in the background
    • what is spyware?

      Software which will allow a person to spy on the users' activities on their devices
    • how is spyware installed on computers?
      This form of software will be embedded into other software such as games or programs that have been downloaded from illegitimate sources
    • what can spyware do?
      Spyware can record your screen, log your keystrokes to gain access to passwords and more
    • what is ransomware?
      A form of malware that locks your computer or device and encrypts your documents and other important files
    • what does ransomware often demand for?
      money to receive the password that will allow the user to decrypt the files
    • what is a negative of ransomware, for the user?
      There is no guarantee paying the ransom will result in the user getting their data back
    • what is social engineering?

      Social engineering is exploiting weaknesses in a computer system by targeting the people that use or have access to them
    • some forms of social engineering? (three things)
      - fraudulent phone calls
      - phishing
      - pretexting
    • what are fraudulent phone calls?
      pretending to be someone else to gain access to their account or their details
    • what is phishing?
      Sending fraudulent emails to a large number of email addresses, claiming to be from a reputable company or trusted source to try and gain access to your details, often by coaxing the user to click on a login button
    • what is pretexting?

      A scammer will send a fake text message, pretending to be from the government or human resources of a company, this scam is used to trick an individual into giving out confidential data
    • do people weak point thing
      okay
    • what is a brute force attack
      A brute force attack works by an attacker repeatedly trying multiple combinations of a user's password to try and gain unauthorized access to their accounts or devices
    • what's an example of a brute force attack?
      an attacker finding out the length of a PIN code, then trying each possible combination, this method tries popular words or phrases that are used in passwords
    • what is a denial of service (dos) attack?
      A Denial of Service Attack (DOS attack) occurs when an attacker repeatedly sends requests to a server to flood the server with traffic, causing it to overload the system
    • what happens to the server after a denial of service attack
      The server will slow down to the point of becoming unusable
    • what is the larger scale version of a does attack?
      Distributed Denial of Service (DDOS) attack
    • how does Distributed Denial of Service (DDOS) attack, work?
      This works in a s similar way to a DOS attack, with the main difference being that the traffic comes from multiple distributed devices in a coordinated attack on a single server/network
    • what is the purpose of a DOS attack?
      - A DOS attack will prevent customers from accessing or using a service
      - This will result in companies losing money and not being able to carry out their daily duties
      - A DOS attack can cause damage to a company's reputation
    • what is data interception and theft?
      Data interception and theft is when thieves or hackers can compromise usernames and passwords as well as other sensitive data
    • what device is used in data interception and theft?
      a packet sniffer
    • what does a packet sniffer do?
      A packet sniffer will be able to collect the data that is being transferred on a network
    • what do thieves gain from data interception and theft?
      A thief can use this data to gain unauthorized access to websites, companies and more
    • what is a SQL?
      Structured Query Language (SQL) is a language used to create, access and manipulate a database
    • what is a SQL injection?
      SQL injection is entering an SQL command into a web text field to manipulate the SQL query
    • what is the goal of a SQL injection?
      The goal is to insert, modify or delete data from the database
    • what is penetration testing?
      - Penetration testing is a method of preventing vulnerabilities whereby a company employs people to try and hack their network and databases
      - This allows the 'hackers' to point out the parts of the system that are vulnerable
      - The companies then use this information to fix the issues that are found
    • what form of attack does penetration testing help prevent?
      SQL injection
    • what is anti-malware software?
      Anti-malware software is a term used to describe a combination of different software to prevent computers from being susceptible to viruses and other malicious software
    See similar decks