1.4

Cards (23)

  • Define malware. (1)
    Software designed to disrupt, damage or gain unauthorised access to computer system.
  • Identify 6 examples of malware. (7)
    - Viruses
    - Trojan horses
    - Worms
    - Ransomware
    - Spyware
    - Adware
  • Describe how malware harms a computer. (4)
    - Files deleted, corrupted or encrypted
    - Computers crash, spontaneously reboot & slow down.
    - Internet connections slower
    - Keylogging - inputs e.g. passwords logged + sent to hackers
  • Identify 6 ways to prevent against malware. (6)
    - Take caution when opening attachments or downloading software
    - Firewall
    - Antivirus
    - Anti-spyware
    - Spam filter
    - Back up files in case ransomware encrypts them
  • Define social engineering. (1)
    Psychologically manipulating people into divulging private information.
  • Define phishing. (4)
    - Fraudulent practice of sending emails
    - disguised as trustworthy source
    - to trick users into revealing personal information
    - e.g. passwords & credit card details
  • Describe how phishing harms a user & a company. (4)
    User:
    - Hacker accesses victim's bank account to withdraw & spend money
    - Via cashing illegitimate cheques or buying services

    Company:
    - Hacker gains access to high-value corporate data
    - Financial services can blacklist company, damaging reputation
  • Identify 5 ways how people can be 'the weak point' in the system. (5)
    - Not updating anti-malware
    - Not logging off comp.
    - Not encrypting data
    - Leaving printouts with sensitive info around
    - Sharing passwords
  • Describe how to prevent against phishing. (3)
    Train to:
    - Spot fake emails & websites
    - Not disclose personal information
    - Disable browser popups
  • Define brute-force attack. (3)
    - Trial & error method
    - where software iterates many password/PIN attempts
    - e.g. trying every word in dict.
  • State the purpose of brute-force attacks. (2)
    - Crack password of account/company
    - to access sensitive information & steal data
  • Describe how to prevent against brute force attacks. (4)
    - Lock account after certain amount of unsuccessful password attempts
    - Progressive delays e.g. 1 hour locked
    - Use complex passwords e.g. "th1s!sn0tmYP@ssw0rdBtW"
    - Challenge-response authentication e.g. reCAPTCHA
  • Define denial of service (DoS) attack. (2)
    - Flooding server with useless traffic
    - so becomes overloaded & unavailable
  • Define distributed denial of service (DDoS) attack. (2)
    - Multiple compromised comps. (zombies) often infected with trojan.

    - Botnet targets victim, causing DoS attack.
  • Describe how a DDoS/DoS attack harms a company. (4)
    - Loss of access to service for customers
    - so lost revenue
    - Lower productivity
    - Damaged reputation
  • Describe how to prevent against DDoS/DoS attacks. (4)
    - Firewall

    - Packet filters on router

    - Configure server w/ modules to halt unwanted traffic

    - Log systems to identify & manage traffic
  • Define data interception and theft. (3)
    - Stealing data from unaware victim
    - with intent of obtaining private info
    - often with packet sniffers to log data transmitted on network
  • Describe how data interception and theft harms a user. (3)
    - Usernames & passwords compromised
    - allowing unauthorised access to accounts
    - leading to disclosure & theft of data
  • Describe how to prevent against data interception and theft. (3)
    - Encryption via VPNs
    - Lock computer when logging off with secure password
    - Investigate network vulnerabilities
  • Define SQL injection. (3)
    - Inserting malicious SQL code into input box
    - so code executed by server
    - allowing vulnerable database to be viewed/edited
  • Describe how an SQL injection can be harmful. (4)
    - Database contents returned, revealing private data
    - e.g. usernames & passwords
    - Database dropped
    - causing mass data loss
  • State 3 ways to prevent against SQL injections. (3)
    - Input sanitisation
    - Parameter queries
    - Penetration testing
  • State how 7 prevention methods can protect a network. (7)
    - Penetration testing - people hack own database to identify & fix vulnerabilities

    - Anti-malware - prevents viruses from infecting system

    - Firewall - prevents unauthorised access

    - User access levels - users have restricted access

    - Secure passwords - harder to guess/crack by brute force

    - Encryption - intercepted data rendered useless

    - Physical security e.g. cameras, alarms - identifies intruder