Locking files e.g ransomware which encrypts all files and demands a largesum of money for them to be decrypted
Spyware (secretly monitors users)
Altering permissions via rootkits
Opening backdoors (holes in security)
Viruses copythemselves and attach to certainfiles. They are spread by copyinginfectedfiles and activated by openinginfectedfiles.
Worms self-replicate without help from a user so spreadveryquickly. They exploit weaknesses in networksecurity.
Trojans are malwaredisguised as software. Users install them without realising they are malware.
What is social engineering?
Manipulating people as the ‘weakpoint’ to gain unauthorisedaccess to information or systems.
What is phishing?
When criminals send emails or texts pretending to be from businesses and add links to spoofversions of the businesses’websites. Users will input personaldata thinking it is real and have their information consequently stolen.
What is one sign of phishing?
Poor grammar/spelling.
What is shouldering?
Stealinginformation via looking over someone’s shoulder.
What is a brute-force attack?
A type of active attack used to gain information via cracking passwords through trial and error, usually with aid from automated software.
What is one system that prevents brute-force attacks?
Lockingaccounts after a number of failedpassword attempts.
What is a denial-of-service attack?
Flooding a network with lots of traffic to make it incredibly slow or inaccessible.
What is a passive attack?
Where someone monitors datatravelling on a network and intercepts any sensitiveinformation they find. These attacks are hard to detect.
What is an active attack?
An attack which usually involves malware.
What is an insider attack?
Exploitation of networkaccess to stealinformation.
What is SQL?
StructuredQueryLanguage - used to access information in databases.
What are SQL injections?
Pieces of SQL typed into a website‘sinputbox to reveal sensitiveinformation.