4-1 Mitigating Risk When Connecting to the Internet

0.0(0)
studied byStudied by 9 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/81

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

82 Terms

1
New cards

Categories of risk on the internet:

- Hackers

- Malware (viruses, Trojan horses, worms)

- Personal attacks (harassment, fraud, identity theft, data theft)

- Email attacks (phishing, spam, email viruses)


2
New cards

Hackers and predators:

Objective of a hacker is to gain access to a computer system or network to do harm, steal data, or both

3
New cards

Hacker and predators methods include:

-Malware

- Exploiting vulnerabilities in system and application software

- Exploiting poorly configured and insecure networks

- Gaining private credentials and other information through social engineering

4
New cards
<p>What is this figure showing? </p>

What is this figure showing?

The relationships of hackers to the other elements of risk on the internet

5
New cards

Hackers/Attackers:

- Outsiders

- Insiders

6
New cards

Outsiders:

- Organized

- Individuals

- Amateurs

7
New cards

Organized:

- Terrorists

- Hacktivists

- Nation-state actors

- Criminals

8
New cards

Amateurs:

Script Kiddies

9
New cards

Insiders:

- Ex-employees

- Thieves

- Unintentional

10
New cards

Hackers and motivations:

- White hat hackers

- Black hat hackers

- Grey hat hackers

- Cyberterrorists

- Sponsored hackers

- Hacktivists

- Script kiddies

- Hobbyists

11
New cards

Common motivations for hackers:

- Personal agenda

- Financial

- Sponsored or cyberwarfare

- Corporate espionage

- Organizational agendas

- Resource theft

12
New cards

Hacker attacks:

- Motivation and technology dictates the choice of type of attack

- Attack method fits vulnerabilities of the targeted system

13
New cards

Types of attack methods:

- Password attacks (brute force, dictionary, hash injection)

- Backdoor attack

- Man-in-the-middle (MitM) attack

- Denial of service (DoS) attack (ping flood, Distributed DoS attack)

14
New cards

Malware:

- Umbrella term that covers many kinds and types of software

- Developed for sole purpose of harm

- May be dormant for a long time before becoming active

- Early forms were hoaxes and pranks

15
New cards

MitM:

Man-in-the-middle

16
New cards

DoS:

Denial of service

17
New cards

Denial of service (DoS) attack:

ping flood, Distributed DoS attack

18
New cards
<p>The Following is an example of what?</p>

The Following is an example of what?

An example of a hoax that simulated the erasure of data from disk

19
New cards

Common forms of malware:

- Viruses

- Worms

- Trojans

20
New cards

Viruses:

A malicious program that can only spread by attaching or inserting itself into a document or file created by software that supports macros, which the virus needs to execute its programming

21
New cards

Worms:

- A self-sufficient program with the ability to replicate itself from one computer to another unaided

- Attempts to exploit operating system or system software vulnerabilities

22
New cards

Trojans:

- Disguised malware that appears to be something desirable so that you will download it onto your system, bypassing countermeasures that may have stopped it

- Not a virus although commonly referred to as such

23
New cards

Common forms of malware:

- Rootkits

- Spyware

- Ransomware

24
New cards

Rootkits:

Is placed on a target computer and hidden so that it can do its malicious activities, such as stealing and transferring data files, keylogging, or a communications log, undetected

25
New cards

Spyware:

Malware focused on collecting and transmitting information regarding the activities associated with accessing the internet and websites, navigation among sites, and harvesting any personally identifiable information (PII) available, such as passwords, payment information, employments, locations, and the like

26
New cards

Ransomware:

A form of malware that disables any access to a targeted computer’s data until a ransom is paid

27
New cards

A Virus, Trojan Horse, and Worms are types of what?

Types of Malware.

<p>Types of Malware.</p>
28
New cards

How does a Virus replicate?

Able to self-replicate.

29
New cards

How does a Trojan Horse replicate?

Does not replicate itself.

30
New cards

How do Worms replicate?

Self-replicated without user intervention.

31
New cards

Is a host required for a Virus?

Needs a host program to propagate.

32
New cards

Is a host required for a Worm?

Self-contained and does not need a host.

33
New cards

Does a Virus need user intervention?

Needs to be activated or executed by a user.

34
New cards

Does a Trojan Horse need user intervention?

User must execute program in which the Trojan horse is hidden.

35
New cards

Do worms need user intervention?

Replicates and activates without requiring user intervention.

36
New cards

Common malware delivery types include:

- Peer-to-peer (P2P) sharing networks

- Network shares

- Email

- Web browsing

37
New cards

To protect a network from hackers and the harm malware can cause:

- Ensure software is current with all patches and service packs

- Install a trusted anti-malware package

38
New cards

To defend systems and networks, administrators and users should be made aware of:

- Software vulnerabilities

- Hardware vulnerabilities

- Malware threats

- Port vulnerabilities

- End-user vulnerabilities

- Physical security vulnerabilities

39
New cards

Personal attacks:

- Protecting against personal attacks and attempts to steal personal data are more about your personal browsing habits than malware.

40
New cards

Fraud:

- Primary trap used on a bad e-commerce site

41
New cards

Ways to spot a fraudulent or malicious site:

- Browser alerts

- Suspicious domain name

- No contact

42
New cards

A safe website displays what and uses what?

A safe website displays the padlock symbol and uses a secure version of HTTP.

<p>A safe website displays the padlock symbol and uses a secure version of HTTP.</p>
43
New cards
<p>What is the following figure showing? </p>

What is the following figure showing?

ICANN Domain and IP Address Lookup Service hat can be used to identify a registered owner

44
New cards

Cyberstalking

A form of harassment; a repeated electronic communication with someone who does not want to communicate

45
New cards

Cyberstalking includes what?

Includes repeated offensive emails, instant messaging spamming, impersonating friends or colleagues, creating hate sites or false online dating ads, stalking target on social media sites

(Physically tracking target and harassing using a smartphone, table, or netbook computer)

46
New cards

To prevent cyberstalking:

- Don’t give out personal information except to a known contact.

- Use filtering features in email and firewalls to block contacts from the harasser.

- Contact the police if it becomes a serious problem.

- Stop all communication with the harasser.

- Block the cyberstalker from social networking sites and only add trusted friends.

47
New cards

Identity theft:

- Goes beyond fraud and occurs when a thief assumes all or some of a victim’s identity

- Uses your personal or financial information without your permission

- Use caution regarding to whom your personal information is given and why it is given

- Keep documents that contain PII locked up

48
New cards

Email attacks:

Email provides a gateway directly into a network through network user accounts

49
New cards

Personal methods to prevent email attacks include not doing the following:

Opening unsolicited emails, unwanted or unknown attachments, sending personal information, giving your email address to a stranger, replying to spam, forwarding chain letters

50
New cards

Technical methods of preventing email attacks include using email checkers or filters to perform the following:

- Email tracking

- Keyword filtering

- Legal disclaimer

- Email blocking

- Message priority

- Message archiving

51
New cards

Online risks and threats:

- Keep applications and operating systems updated.

- Use trusted antivirus/anti-spyware applications. Ensure the applications are up to date.

- Protect portable devices such as smartphones, tablets, and other portable PCs from theft and password protect and encrypt all data to ensure that should it be stolen, it cannot be read.

- Secure wireless access points and other gateway devices.

- Use properly configured gateway, edge, and perimeter protection, such as firewalls, intrusion detection systems, and intrusion prevention systems and routers.

- Encrypt data at rest and data in transit to ensure integrity and confidentiality.

52
New cards

Types of Website Hosting:

- External web hosting

- Internal web hosting

53
New cards

External web hosting:

Offered by web hosting providers:

- Disk storage space

- Available bandwidth

- Technical support

- Post Office Protocol version 3 (POP3) email accounts

- Email forwarding

- Email auto-responders

- Email aliases

- File Transfer Protocol (FTP) access

- Password protection

54
New cards

POP3

Post Office Protocol version 3

55
New cards

FTP:

File Transfer Protocol

56
New cards

Internal web hosting:

- Web server with redundant drives and hardware to ensure uptime

- High-speed internet connection to handle bandwidth requirements

- Adequate disk storage to hold the site

- Physical and logical security measures

- IT personnel who can manage the programming, maintenance, and security of the site

- Strong backup procedures including considerations for offsite backup storage

57
New cards

Whois (private or public):

- When signing up for a domain, you use an authorized domain registrar.

- Internet Corporation of Assigned Names and Numbers (ICANN)

  • Governing body for all domain names

  • Keeps a record of every domain name, who owns it, and how and where it is being used

  • Often referred to as Whois data because you can search for a domain owner and

contact information from ICANN registration records

- Registrars offer private settings to provide more protection of personal data.

58
New cards

ICANN:

Internet Corporation of Assigned Names and Numbers

59
New cards

Internet Corporation of Assigned Names and Numbers (ICANN):

- Governing body for all domain names

- Keeps a record of every domain name, who owns it, and how and where it is being used

- Often referred to as Whois data because you can search for a domain owner and contact information from ICANN registration records

60
New cards

ICANN is often referred to as . . .

Whois data because you can search for a domain owner and contact information from ICANN registration records

61
New cards

DNS

Domain Name System/Server

62
New cards

Domain Name System (DNS):

- Standard name resolution strategy used on networks today

- Works on all operating system platforms

- Function of DNS is to resolve host names

63
New cards

DNS names:

- Most internal networks and internet use DNS naming.

- You need to plan and design the DNS namespace to be used.

- First, choose the top-level domain name that will be used to host the organization’s name on the internet.

- Second, choose the second-level domain name that identifies the actual organization (google.com, for example). Referred to as parent domain name and is the domain name used on the internet.

64
New cards

.com

Used by commercial organizations

65
New cards

.gov

Government organizations

66
New cards

.net

Network providers

67
New cards

.org

Nonprofit organizations

68
New cards

.edu

Educational organizations

69
New cards

.mil

Military

70
New cards

.ca

Country-specific domains

71
New cards

Common Top-Level Domain Names:

.com

.gov

.net

.org

.edu

.mil

.ca

<p>.com</p><p>.gov</p><p>.net</p><p>.org</p><p>.edu</p><p>.mil</p><p>.ca</p>
72
New cards

Common DNS attacks:

- DoS attacks

- Footprinting

- Address spoofing

- Redirection

73
New cards
<p>What is the following image a sample of?</p>

What is the following image a sample of?

- Sample of the DNS Organization of the Internet:

74
New cards

Best Practices for Connecting to the Internet:

- Keep all applications current.

- Use trusted anti-malware software.

- Use perimeter security.

- Secure backups.

- Use secure passwords.

- Report cybercrime.

- Protect personal information.

- Use data encryption.

75
New cards

Keep all applications current:

Look for updates to software including productivity software, virus, and operating systems.

76
New cards

Use trusted anti-malware software:

Antivirus software includes mitigation strategies for known malware. Keep this software installed and current.

77
New cards

Use perimeter security. Home users and corporate networks need to incorporate strong perimeter security strategies:

This includes the firewall, intrusion detection system (IDS), and intrusion prevention system (IPS).

78
New cards

Secure backups:

Backups on removable media such as tape sets and USB needs to be secure in the event of theft.

79
New cards

Use secure passwords:

Choosing hard-to-guess passwords goes a long way to securing many online transactions.

80
New cards

Report cybercrime:

If you suspect that you or someone you know is a victim of cybercrime, such as stalking or bullying, report it to the police.

81
New cards

Protect personal information:

If using social networking sites, use caution when divulging personal information.

82
New cards

Use data encryption:

The ability to encrypt data is built into operating systems. It is a best practice to encrypt data to prevent it from being read if stolen.