What is meant by malware?
Malicious software - an umbrella term for hostile or intrusive executable programs that run on the computer.
What are the 5 different types of malware?
What is the intended impact of a virus?
What is the intended impact of a worm?
What is the intended impact of a Trojan?
To infect the device with malware
What is the intended impact of spyware?
To record keypresses and transmit to a 3rd party , allowing the gain of personal info
What is the intended impact of ransomware?
To prevent users accessing files in order to extort a payment
How are viruses used?
How are worms used?
How are trojans used?
How is ransomware used?
What is meant by social engineering?
the ability to obtain confidential information by asking people for it. It is based on the premise that ‘People are the weakest link in any system / network’
What are the three types of social engineering?
What is the intended impact of social engineering?
What is meant by shoulder surfing?
Shoulder surfing is the ability to get information or passwords by observing as someone types them in.
What is meant by pretexting?
Impersonating an IT or Account support representative use this false identity to deceive the victim into providing confidential information or granting access to secure areas.
What is meant by phishing?
Sending victims a communication that looks genuine, containing a link to fraudulently obtain their personal information.
What is the purpose of a brute force attack?
To gain access to a computer system via a user’s account, to then edit / delete data or install malware or use gained password elsewhere or block access to the account.
How are brute force attacks orchestrated?
Programs which attempt all the possible password combinations
How are denial of service attacks conducted?
People / software make many requests for data from a web server.
What is the purpose of denial of service attacks?
The web server cannot respond to all requests and crashes. This could be for financial gain (request payment to stop the attack) or to damage the company’s reputation.
How is data interception and theft used?
To gain unauthorised access to data being sent to another device
What is the purpose of data interception?
Data transmission is read by an an unauthorised user / program, meaning personal information can be obtained and profited from + can gain access to personal data / sensitive files + can install malware
What is the purpose of an SQL injection?
It results in unauthorised access to data / modification of data / deletion of data