1/20
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
What are the six types of malware summarized in Table 5.2?
Viruses: Programs that replicate and attach themselves to other files, aiming to corrupt or delete data.
Worms: Standalone malware that self-replicates without needing a host file, spreading across networks and causing congestion.
Trojan horses: Disguised as legitimate software but harmful, executing malicious activities on the user's system.
Spyware: Monitors user activity to collect sensitive information without consent.
Adware: Bombards users with unwanted advertisements, mainly via pop-ups, often affecting system performance.
Ransomware: Encrypts user data, demanding payment for the decryption key.
What is a virus?
A form of malware that can replicate itself by attaching to other files.
Designed to corrupt or delete files on a computer, causing data loss.
How do worms differ from viruses?
Independence: Worms are standalone and do not need to attach to host files, unlike viruses.
Self-replication: Worms can replicate themselves autonomously across networks.
Impact: They consume bandwidth and system resources as they spread.
What are Trojan horses usually disguised as?
Legitimate software applications.
They appear safe but perform harmful actions once installed on the user's system.
What does spyware do?
Monitors and collects information about user activities.
Often tracks online behavior to gather sensitive data like passwords and credit card information.
What is adware?
Software that automatically displays or downloads unwanted advertisements.
Usually manifests as pop-ups and can slow down system performance.
What is ransomware?
A type of malware that encrypts a user's files and data.
Demands a ransom payment in exchange for the decryption key to restore access.
What does phishing entail?
Sending emails that appear legitimate to deceive users.
Aimed at extracting personal data, such as login credentials and financial information.
What are some strategies to prevent phishing attacks?
Use anti-phishing toolbars and filters.
Avoid clicking on suspicious links in emails or messages.
Participate in security awareness training to recognize phishing attempts.
What is pharming?
Malicious code or techniques that redirect users from legitimate websites to fraudulent ones.
Occurs without the user's awareness, often aiming to steal personal data.
How can users detect and mitigate pharming attacks?
Utilize anti-virus and anti-malware software to detect threats.
Verify website authenticity by checking spelling and URL structure.
Look for HTTPS indicators to ensure secure connections.
What is social engineering?
A strategy that manipulates individuals into breaking security protocols.
Exploits human psychology rather than technical vulnerabilities.
What types of social engineering threats exist?
Phishing scams: Deceptive emails targeting personal information.
Baiting: Offering something enticing to lure victims.
Impersonation: Fake IT support calls to extract sensitive information.
Scareware: Misleading alerts that instill fear to trick users into malicious actions.
What is the purpose of access levels in computer systems?
Controls user permissions based on roles within an organization.
Restricts access to sensitive data, enhancing security.
What are the common factors used in authentication?
Something you know: Typically a password or PIN.
Something you have: A physical device, such as a security token or smartphone.
Something unique to you: Biometric data, like fingerprints or facial recognition.
What is two-step verification?
An additional security process requiring two distinct forms of authentication.
Enhances account security by making unauthorized access harder.
What distinguishes strong passwords from weak passwords?
Strong passwords: Combine capital letters, numbers, and special characters, making them complex and hard to crack.
Weak passwords: Often simple words or easily guessable sequences.
What role do firewalls play in cybersecurity?
Serve as a barrier between trusted internal networks and untrusted external networks.
Filter incoming and outgoing network traffic based on established security rules, preventing unauthorized access.
What is the function of a proxy server?
Acts as an intermediary for requests from clients seeking resources from other servers.
Filters internet traffic and helps disguise users' IP addresses for added privacy.
What is the SSL protocol used for?
Secures data transmission over the internet through encryption.
Ensures secure communication between clients and servers by protecting sensitive information.
What should you look out for in potentially phishing emails?
Spelling errors: Often indicative of fake communications.
Suspicious links: Hover over links to check their real destinations.
Inappropriate tone: Language that seems unusual or overly urgent.