1/21
These flashcards cover key concepts related to network threats, types of malware, cybersecurity practices, and functionalities of operating systems and utility software.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
What does the term 'malware' refer to?
Malware refers to executable programs that run on a computer with the intent to cause harm, originating from the words malicious and software.
Name the four main types of malware.
The four main types of malware are viruses, worms, trojans, and ransomware.
What is a computer virus?
A computer virus is malware that infects computers by replicating its code in other programs and harming the computer by deleting, corrupting, or modifying files.
How do worms differ from viruses?
Worms replicate themselves to spread to other computers and may cause network slowdowns, but they might not cause direct damage to individual computers.
What is a trojan in the context of malware?
A trojan disguises itself as a legitimate program, game, or file that users want but contains negative code that causes damage or provides unauthorized access.
What is the purpose of ransomware?
Ransomware locks or encrypts access to a computer, holding it hostage until a ransom is paid for access to be restored.
What is social engineering?
Social engineering is the technique of obtaining confidential information by manipulating individuals into providing it.
Define phishing in the context of cyber threats.
Phishing is a fraudulent attempt to obtain sensitive information by disguising as a trustworthy entity in electronic communications.
What is shoulder surfing?
Shoulder surfing is a method of obtaining information such as passwords by closely observing someone as they enter it.
Explain the Denial of Service (DoS) attack.
A DoS attack involves overwhelming a server with excessive requests, causing it to slow down or go offline.
What is a Man in the Middle (MITM) attack?
A MITM attack allows an attacker to intercept and potentially alter communications between a user and server.
What are some measures to prevent malware on mobile devices?
To reduce threats on mobile devices, use strong passwords, encrypt data, avoid suspicious emails, and research apps before installation.
What is a brute force attack?
A brute force attack is a method where a hacker tries numerous combinations of passwords until the correct one is found.
Describe SQL Injection.
SQL Injection is a technique that exploits vulnerabilities in web input forms to access or destroy data using SQL commands.
What is penetration testing?
Penetration testing is the practice of deliberately searching for security vulnerabilities in one's own system.
How does anti-malware software function?
Anti-malware software detects malware, sends findings to antivirus companies, which then create signatures and updates for malware detection.
Define encryption in cybersecurity.
Encryption is the process of coding data to prevent unauthorized access and ensure it cannot be read without the decryption key.
What is the role of firewalls in network security?
Firewalls separate trusted networks from untrusted ones, filtering incoming and outgoing traffic based on security rules.
What does user access level mean in terms of file management?
User access levels determine what users can do with files and folders, such as read, write, or modify permissions.
What is utility software?
Utility software performs tasks that help manage and maintain computer resources, such as antivirus functions and file management.
What is data compression software used for?
Data compression software reduces the size of files or folders, saving storage space and facilitating easier data transfer.