1.4.1 Threats to computer systems and networks

0.0(0)
studied byStudied by 0 people
0.0(0)
full-widthCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/5

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

6 Terms

1
New cards

What is malware?

malicious software designed to cause harm to a computer system/ network

2
New cards

What are the types of malware? Define each.

  • virus

    • Programs embedded within other files and can replicate themselves to become part of other programs

    • often cause damage by deleting or modifying data

  • worm

    • similiar to virus but doesn’t need to attatch itself to a program

    • can spread across a network

  • trojan

    • programs disguised as a legitamate software but contains malicious code inside it

  • spyware

    • programs that monitor user activity

  • ransomware

    • program that locks/ encrypts your data and demands for ransom, often money, to unlock it

    • no guarantee that paying the ransom will result in getting data back

3
New cards

What is social engineering?

exploiting weaknesses in a computer system by targeting the people that use or have access to them

4
New cards

What are the types of social engineering attacks? Define each.

  • Phishing

    • emails designed to steal money/ logins/ identity by getting user to click a link

  • Human error

    • humans using devices on their computer without knowing what is on them

  • Blagging

    • act of knowingly or recklessly obtaining/ disclosing information of personal data without consent of owner

  • Pretexting

    • A scammer will send a fake text message to trick an individual into giving out confidential data


5
New cards

Why are people seen as the weak point in computer systems?

  • because human errors can lead to significant issue e.g.

    • Not locking doors to computer/server rooms

    • Not locking their device when they're not using it

    • Sharing passwords

    • Not encrypting data

    • Not keeping operating systems or anti-malware software up to date

6
New cards

What are the other forms of attack?

  • Brute force attack

    • using trial and error to guess a password

  • Denial of service attacks

    • overloading a website or network, with the aim of degrading its performance or even making it completely inaccessible

  • Data interception and theft

    • unauthorised act of capturing data as it is being transmitted across a network

  • The concept of SQL injection

    • malicious SQL code that is inputted into an input box in a website, tricking server to give details if website is not secure