Save
...
Paper 1
Networks Security
Network Threats
Save
Share
Learn
Content
Leaderboard
Share
Learn
Created by
Caylin Hindle
Visit profile
Cards (39)
What is malware?
Harmful program damaging
computer systems
View source
How does a virus spread?
By attaching to
infected
files
View source
When is a virus activated?
When
opened
by
a
human
View source
What can a virus do once activated?
Change data or
corrupt
the system
View source
How does a worm spread?
By finding
weaknesses
in
software
View source
What is a key difference between a worm and a virus?
A worm does not need
human interaction
View source
How quickly can a worm spread?
Very quickly across a
network
View source
What is a trojan?
Harmful program disguised as
legitimate
software
View source
What does a trojan provide to an attacker?
Backdoor
access to the system
View source
Do trojans self-replicate?
No
,
they
do
not
self-replicate
View source
What does spyware do?
Records
user
activities secretly
View source
What information does spyware aim to record?
Usernames
,
passwords
, and
credit card
info
View source
What is a keylogger?
Records
key presses
of a user
View source
How can keyloggers be installed?
Downloaded
or plugged into
USB
port
View source
What does ransomware do?
Locks files using
encryption
View source
What do attackers demand in ransomware attacks?
Money to
decrypt
the data
View source
Why is it difficult to trace ransomware attackers?
They use digital currencies like
bitcoin
View source
What is SQL used for?
Manipulating data in
databases
View source
What is an SQL injection?
Malicious SQL query entered into a
website
View source
What can an SQL injection allow an attacker to do?
Gain
unauthorized
access to a
database
View source
How does a DoS attack work?
Overloads a
server
with requests
View source
What is the impact of a DoS attack?
Slows the
system
and may take websites offline
View source
What is a DDoS attack?
Coordinated attack using a
botnet
View source
How does a botnet function?
Controls a large group of
infected
devices
View source
What is a brute-force attack?
Tests every possible
password combination
View source
How can a brute-force attack be sped up?
By using multiple
computer systems
View source
What is social engineering?
Tricking others into revealing
personal data
View source
Give an example of social engineering.
Impersonating an
IT technician
via email
View source
What is data interception?
Copying data packets by a
third party
View source
What software is used for data interception?
Packet sniffers
View source
What are the types of malware discussed?
Virus
Worm
Trojan
Spyware
Keylogger
Ransomware
View source
What are the characteristics of a virus?
Replicates
itself
Attaches to
infected
files
Activated by
human interaction
View source
What are the characteristics of a worm?
Replicates
itself
Spreads through
software
weaknesses
Does not need human
interaction
View source
How do spyware and keyloggers work?
Spyware
records
user activities secretly
Keyloggers record
key presses
and send data
View source
How does ransomware operate?
Locks files using
encryption
Demands money to
decrypt
data
View source
What is the difference between DoS and DDoS attacks?
DoS:
Single
source attack
DDoS: Coordinated attack using
multiple
sources
View source
What are the methods of preventing vulnerabilities?
Regular
software
updates
Strong
password
policies
User education on security threats
View source
What are the impacts of a DoS attack?
Slows
system performance
May take websites offline
temporarily
View source
What is the role of packet sniffers?
Intercept and analyze
data packets
Used by
attackers
to gather information
View source