Duplicate
Export
Register
CCC1003
1 Flashcard Deck
Send to Chat
AI Edit
Heading 3
Highlight
Here's your flashcard deck!
Send to Chat
AI Edit
Normal Text
Highlight
You can edit it by clicking the 'edit'! Once you have a few cards, you can begin to study it in full screen or use our AI study mode!
Flashcard Deck
Study
What is social engineering?
Social engineering is the practice of manipulating people to divulge private data.
What is phishing?
Phishing attempts to trick people into believing a fake website is real.
What is phishing scam?
PHISHING is a scam in which a perpetrator sends an official looking e mail message that attempts to obtain your personal and financial information.
How does phishing work?
Some phishing e-mail messages ask you to reply with your information, others direct you to a phony Web site or a pop-up window that looks like a Web site that collects the information.
What is pharming?
PHARMING is a scam similar to phishing where a perpetrator attempts to obtain your personal and financial information via spoofing, redirecting you to a phony Web site that looks legitimate.
What is malicious software?
Malicious software, or malware, is created and distributed by crackers. The three most common types are viruses, worms, and Trojan horses.
What is a computer virus?
A computer VIRUS is a potentially damaging computer program that affects or infects a computer negatively by altering the way the computer works without the user's knowledge or permission.
How does a computer virus spread?
Once the virus infects the computer, it can spread throughout and may damage files and system software, including the operating system.
What is a worm?
A WORM is a program that copies itself repeatedly, using up resources and possibly shutting down the computer or network.
What is a Trojan horse?
A TROJAN HORSE is a program that hides within or looks like a legitimate program, but contains malicious programs and does not replicate itself to other computers.
What is a rootkit?
A ROOTKIT is a program that hides in a computer and allows someone from a remote location to take full control of the computer, execute programs, change settings, monitor activity, and access files on the remote computer.
What is a rootkit?
A rootkit is a type of malware that, once installed, allows the author to execute programs, change settings, monitor activity, and access files on the remote computer.
What are some legitimate uses of rootkits?
Rootkits can have legitimate uses, such as in law enforcement.
What are other classes of malware?
Other classes of malware include back doors and spyware.
What is a back door in the context of malware?
A back door is a program or set of instructions in a program that allows users to bypass security controls when accessing a program, computer, or network.
What are some symptoms of a computer infected by malware?
Symptoms of a computer infected by malware include slow operating system, less available memory, corrupted files, unusual messages or images on the screen, random music or sounds, disappearing programs or files, and malfunctioning programs or files.
Signs of Malware Infection
Unknown programs or files mysteriously appear System properties change Operating system does not start up Operating system shuts down unexpectedly
Ways Malware Delivers Payload
1. Opens an infected file 2. Runs an infected program 3. Boots the computer with infected removable media inserted 4. Connects an unprotected computer to a network 5. Certain conditions or events occur, such as the computer's clock changing to a specific date
Common Way of Virus Infection
Users opening infected email attachments
Malicious Hardware Types
1. Zombies (remotely controlled computers used for malicious purposes) 2. Rogue Wi-Fi hotspots (network that appears to be legitimate free Wi-Fi hotspot) 3. Infected USB flash drives (USB drives that contain a virus)
Denial of Service (DoS) Attack
An assault to disrupt computer access to an Internet service. Perpetrators send an influx of confusing data messages or traffic to slow down or make the network unavailable.
Distributed Denial of Service (DDoS) Attack
Uses a Zombie Army to attack computers or computer networks, causing extensive damage and temporary outage at numerous websites.
Damage of DoS or DDoS Attack
Extensive damage resulting in sales loss for retailers, revenue loss for news sites and search engines, and delayed time-sensitive information. Repeated attacks can tarnish reputations.
Spoofing
A technique used by intruders to make their network or Internet transmission appear legitimate to a victim computer or network.
What is spoofing?
Spoofing is a technique used by intruders to make their network or Internet transmission appear legitimate to a victim computer or network.
What is email spoofing?
Email spoofing occurs when the sender's address or other components of the email header are altered to make it appear that the email originated from a different sender.
What is a firewall?
A firewall is hardware and/or software that protects a network's resources from intrusion by users on another network, such as the Internet.
What is intrusion detection software?
Intrusion detection software automatically analyzes all network traffic, assesses system vulnerabilities, identifies unauthorized intrusions, and notifies network administrators of suspicious behavior or system breaches.
What is a honeypot?
A honeypot is a vulnerable computer set up to entice an intruder to break into it. It allows organizations to learn how intruders exploit their network and attempt to catch perpetrators.
Send to Chat
AI Edit
Normal Text
Highlight
Continue adding your notes here.
Scholarly Assistant's Insights
A flashcard deck covering cybersecurity topics like social engineering, phishing, malware, viruses, and cyber attacks.
Computer Security
Network Security
Malware
Phishing
Social Engineering
+12 more
Ask Scholarly Assistant
Similar Pages
Login to Leave a Comment
Give your feedback, or leave a comment on a page to share your thoughts with the community.
Login