E-Security (Chapter 5) Flashcards

(41 cards)

1
Q

Keeping personal data secure (6)

A
  • Firewall
  • Penetration testing
  • Levels of access
  • Authentication techniques
  • Network Policies
  • Software Updates
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Misuse of personal data (4)

A

Smishing, vishing, phishing, pharming

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Types of malware (6)

A
  • Spyware
  • Adware
  • Worm
  • Trojan Horse
  • Virus
  • Rootkit
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

How malware is used (3)

A

Fraud
Industrial Espionage
Sabotage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Malicious bots (3)

A

Ransomware
Scareware
Fileless Malware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Software prevention of malware (3)

A

Firewall
Anti virus
Anti Malware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Physical prevention of malware (6)

A
  • Develop anti-malware policies
  • All employees should be educated on malware
  • OS and software kept up-to-date
  • Using strong passwords
  • Logging off after using a computer
  • Careful inspection of emails and messages
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Firewalls

A

FIrewalls prevent data coming into the network, preventing hackers.
It filters traffic to only let in acceptable data.
It can also prevent leakage of data coming out of the network.

However, hackers can still physically steal the computer
^ or access the network after bypassing security (eg password)
^ or use software to change the IP to an acceptable one

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Penetration testing

A

This is when companies employ a person to deliberately attack their network to identify any weaknesses in the security.
It is a simulation of a real cyberattack
It can help a company evaluate their network security // implement more secure methods.

However, it’s time-consuming and can disrupt the business. it also has to be done while system isnt used which can cause downtime

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Authentication techniques

A

Users in the network should use an ID and password to log in.
They can also use smart cards or biometric data (eg fingerprint)
^ This is more expensive but is more effective as it’s unique to the user & cant really be changed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Levels of access

A

Users in the network can be given different levels of access in the network depending on what tjey need to know.
Users with higher access can see more than others

However, its complicated to set up and can delay work

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Network policies

A

Network Policies are rules implemented to allow a company to see who is allowed to access their networks. when a worker joins, they must sign an agreement.
^ it doesn’t stop hackers, but it limits the access employees have to personal data // what they do with it
(e.g.: security policy, acceptable use policy, etc.)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Software updates

A

Software updates eliminate bugs and make software easier to use.
It eliminates security weaknesses, boosts performance, brings new features
It is important to update asap as hackers exploit weaknesses quickly
(Small patches/Major updates)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Pharming

A

Making the user download malicious data // installing it without their knowledge
Can redirect users to fake websites to download malware (if they hack the DNS server or infect the computer)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

How to prevent pharming (5)
## Footnote
hint:
FPLANS
DEOULC

A
  • Keeping software updated
  • be wary for fake websites
  • Only enter personal data into websites with SSL (HTTPS)
  • Enabling two-factor authentication
  • using anti-malware softwarre
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Smishing

A

Smishing (SMS phishing) tricks users into clicking on harmful links through text messages.
The scammers pose as banks, delivery services, etc. to send urgent messages.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Preventing smishing (4)

A
  • check for weird URLs
  • spelling and grammatical errors
  • do not click on links from unknown numbers
  • ask the company about the SMS
18
Q

Vishing

A

Vishing (voice phishing) are phone calls made to trick someone into telling them personal / sensitive data.
scammers pose as banks or prize-givers, asking for personal info over the phone such as their credit card number

19
Q

Preventing vishing (5)

A
  • dont answer unknown numbers
  • dont call numbers in voicemails
  • block suspicious numbers
  • dont share personal details over the phone
  • confirm with the og (banks)
20
Q

Phishing

A

Phishing is a way for scammers to trick users into giving personal information through email.
1: banks - the scammer pretends to be a bank or official company, containing a link to a fake website so that the user enters their information.
2: prizes - the scammer pretends that the user has won a prize (eg free car) and sends them a link for them to enter their personal information .

21
Q

Preventing phishing (5)

A
  • anti-malware // anti-phishing software
  • Look for errors in the email
  • Look for generic subjects (dear user)
  • Delete suspicious emails / move them to spam
  • dont accept too-good-to-be-true deals.. obviously..
22
Q

Use of malware in fraud

A

It involves the use of the computer to benefit financially (illegally).
Once fraudsters get personal info, they can sell it to other criminals or commit identity theft

23
Q

Uses of malware in industrial espionage

A

Malware is used to spy on competitors. It gains access to an employer’s computer and uses / steals a large amount of info on it.
It can also be bidded to other criminals for the highest sum of money
(eg spyware can be used to record video recordings of the computers activities, stealing relevant personal information)

24
Q

uses of malware in sabotage

A

Malware can be used to intentionally attack specific computers and networks so that they stop working. It involves stopping users from accessing the network or allowing hackers to access it
(eg worms are used to slow down processes significantly)

25
Ransomware
Ransomware is a type of malware that restricts a user from accessing certain files unless a ransom is paid to a hacker. They do this by encrypting the files on the computer and asking for money to decrypt it.
26
Fileless malware
Fileless malware doesn’t rely on files so it can vanish without evidence once it has been executed, making it harder to track down where the malware came from.
27
Scareware
Scareware tricks users into thinking their computer has been infected by sending messages to the user. It scams them by making them pay for “an antivirus”
28
Virus
A virus attaches itself to legit programs or files, and self-replicates and spreads to other computers It corrupts data and steals information, slowing down / stopping the system They spread through infected files, links, or downloads
29
How to prevent viruses (4)
- dont open random attachments - anti-virus software - firewall - scan hardware for viruses
30
Worm
A worm is a replicating malware which spreads across networks, exploiting holes in them. their aim is to fill up bandwidth to slow everything down. they can be identified by noticing less free space and shitty performance
31
How to prevent worms
- updating software - anti-malware - disconnecting computers from networks when not needed
32
Trojan horse
Malware that is disguised as legit software, which tricks users into installing it, then secretly steals data / creates backdoors for other malware or hackers. It is only executed when run by the user and it does not replicate.
33
Preventing trojan horses (2)
- only run software from trusted sources - anti-malware
34
Spyware
Malware that collects information of a user’s activities without their knowledge. it uses keyloggers to steal passwords or personal data
35
Preventing spyware (4)
- noticing a reduction in processing power / bandwidth while no apps or files are in use - not downloading any software from unknown sources - reading the fine print of software that may be tricking you into agreeing to spyware - anti-malware
36
Adware
Adware is normally downloaded with free software and automatically generates . its not necessarily dangerous, just annoying since it can slow down your activity
37
Preventing adware (2)
- anti-malware - Checking the list of components in the software that you are downloading
38
Rootkit
Malware that enables a criminal to gain admin priveleges to a computer without the users knowledge to steal data. It can either **1** be downloaded through links or **2** be directly installed through USBs.
39
Preventing rootkits (3)
- dont plug random usbs into your computer - strong passwords that are regularly changed. - anti-malware
40
Advantages of malware (for criminals)
- automatically spread / steal data - financial gain for criminals - data theft - disruption
41
disadvantages of malware (for users)
- data loss or damage - financial loss - privacy invasion - device lag - identity theft / legal consequence