1.4.1 Threats to computer systems and networks

studied byStudied by 1 person
0.0(0)
learn
LearnA personalized and smart learning plan
exam
Practice TestTake a test on your terms and definitions
spaced repetition
Spaced RepetitionScientifically backed study method
heart puzzle
Matching GameHow quick can you match all your cards?
flashcards
FlashcardsStudy terms and definitions

1 / 15

flashcard set

Earn XP

Description and Tags

16 Terms

1

What is malware?

  • any type of harmful program that seeks to damage or gain unauthorised access to your computer system

  • virus, worms, trojans, spyware and ransomware

New cards
2

What are the features of computer viruses?

  • programs embedded within other files

  • only activated when opened by a human

  • replicate their code in other programs

  • infect other copmputers

  • harm by corrupting, deleting or modifying files. the damage may cause the system to stop working

New cards
3

What are the features of worms?

  • not hidden within other files

  • replicates to spread to other computers by finding weaknesses in software

  • does not need an infected file or human interaction to spread

  • often spread through email

  • can spread very quickly once it has infiltrated a network

  • slows down networks and computers but it might not cause any other damage

New cards
4

What are the features of trojans?

  • harmful program that looks like legitimate software or a cracked file that a user wants

  • deceives users into installing it

  • do not self replicate or infect other files

  • the program will often work as intended but give an attacker backdoor access to the system

  • might also contain malware that causes damage

New cards
5

What are the features of spyware?

  • monitor and record user activities

  • will record websites visited, personal information and financial information

  • this is passed to the attacker to use

New cards
6

What are the features of ransomware?

  • holds a computer hostage by locking or preventing access to files on it by encrypting them

  • the attacker demands money from the victim to decrypt the files but might not necessarily do this if the user pays them

  • attackers usually use digital currencies as this makes them harder to trace

  • encrypted data can only be recovered if back ups are available

New cards
7

What is social engineering?

  • to trick others into revealing their personal data by posing as a trusted source

  • phishing, shoulder surfing and poor network policy or people not following it

New cards
8

What is shoulder surfing?

  • obtaining information as someone types it in such as by looking over their shoulder or using CCTV

New cards
9

What is phishing and what are the features of it?

  • tricking users into entering personal details to an attacker

  • poses as a legit site in email or texts

  • provides a link to fake version of the real site

  • non personalised greeting

  • variation of a genuine web address

  • forged link

  • request for personal info which legit companies do not do through email/text

  • sense of urgency

  • poor spelling and grammar

New cards
10

poor network policy

….

New cards
11

What is a brute force attack?

  • trying every possible combination of password until the correct one is found

  • slow but can be sped up using a computer program or multiple computer systems

New cards
12

What is a denial of service (DoS) attack?

  • a computer repeatedly sends requests to a server which floods and overloads it (sometimes a hacked computer will be made to do this)

  • The server is unable to process and respond to all these requests

  • it will be slowed or shut down and may take websites offline temporarily

  • a distributed denial of service attack (DDos) is a coordinated attack using a botnet (a large group of devices controlled and used maliciously by an attacker)

New cards
13

What is interception in a network?

  • data packets are eavesdropped on by a third party and copied to a different location than the intended destination

New cards
14

What is a man in the middle attack?

  • attacker intercepts communications between the user and the server

  • uses a packet sniffer to eavesdrop and find personal info

  • can add different info to a web page or email

  • unencrypted WiFi increases the risk

New cards
15

How can data theft happen?

  • loss of a digital device can lead to the loss of all the data stored on it

  • man in the middle attacks

  • malware such as trojans may create back doors to allow malicious users to access your device

  • legitmate seeming apps might be malicious and lead to fraudulent charges on your phone bill or theft of info

  • this info can be used for identity theft

New cards
16

What is SQL injection?

  • a malicious SQL query is entered into a web form as an input rather than the expected data

  • this can be interpreted by vulnerable web applications can give the user unauthorised access to the database

  • an SQL injection can be used to view, modify or destroy information on the database

New cards

Explore top notes

note Note
studied byStudied by 111 people
262 days ago
5.0(1)
note Note
studied byStudied by 9 people
36 days ago
5.0(1)
note Note
studied byStudied by 3 people
19 days ago
5.0(1)
note Note
studied byStudied by 15 people
852 days ago
5.0(2)
note Note
studied byStudied by 32 people
91 days ago
5.0(1)
note Note
studied byStudied by 42 people
933 days ago
5.0(2)
note Note
studied byStudied by 13 people
831 days ago
5.0(1)
note Note
studied byStudied by 62 people
797 days ago
5.0(1)

Explore top flashcards

flashcards Flashcard (20)
studied byStudied by 1 person
799 days ago
5.0(1)
flashcards Flashcard (102)
studied byStudied by 13 people
527 days ago
5.0(2)
flashcards Flashcard (64)
studied byStudied by 5 people
693 days ago
4.0(1)
flashcards Flashcard (46)
studied byStudied by 15 people
16 days ago
5.0(1)
flashcards Flashcard (43)
studied byStudied by 3 people
136 days ago
5.0(1)
flashcards Flashcard (80)
studied byStudied by 2 people
659 days ago
5.0(1)
flashcards Flashcard (166)
studied byStudied by 1 person
733 days ago
5.0(1)
flashcards Flashcard (74)
studied byStudied by 157 people
777 days ago
5.0(6)
robot