hw 12/5
Test yourself 241
- A botnet aims to take control of digital systems. It is a type of malware that allows a cyber security attacker to take control of someone's system without their knowledge.
- The aim of a DOS attack is to make a network inaccessible to users. It does this by flooding the network with traffic which in turn slows its speeds down to a point where it is basically unusable.
- One of the main differences between a DOS attack and a DDOS attack is a DDOS attack tends to use multiple devices to try and infiltrate a network. The types of networks that are usually under threat from these would be ones like websites, banks, and payment websites.
- Some of the main websites that are targeted by DDOS attacks would be ones like banks and payment websites.
Test yourself 242
- One way of trying to find a password is using a dictionary software. This goes through some of the most common passwords and trying them when trying to get access to the account.
- A brute force attack is a type of software that combines various letters, numbers, and symbols until the password is found. For smaller passwords it won't take long for the software to find it. However, for passwords long than 8 characters with a range of numbers, letters, and symbols would take much long for the software to find it.
- When making a password, you should aim to have a minimum of 8 characters.
- An SQLI threat exploits a weakness in a website or web-based applications. The main aim is to let hackers exploit vulnerabilities in a website or in a web-based application and they try and steal data that might be held on it.
- When someone is trying to carry out an SQLI, all the person must do is identify the URL that they want to exploit.
Test yourself 243
- Adware is the software that makes things like ad pop ups possible. They are the reason why the make of ads can get revenue of their ads. There is usually harmless, but they can have spyware or key loggers implemented into them.
- A RAT stands for remote access trojan. This allows hackers to access, use, and infect a system.
- Ransomware is software that is being held ‘captive’ until someone pay the capture money to get it back.
- When spyware is installed on a computer, some of the changes that can happen could be making internet connection slower, making the system itself feel slower, or there could be changes in your web browser setting (what websites you can visit or download).
- A worm attack is a malware attack that doesn't attach itself to a system and instead just works through the network. Some of the things it can do can range from something as serious as opening devices on your network to make them more vulnerable to further attacks or even just consuming the bandwidth, making the connection slower.
Test yourself 246
- A turncloak is something that has affected a network from the inside. This could be by something like someone opening something that is able to connect itself to the network and infiltrate it.
- The two steps in cross scripting are injecting the malicious code into the vulnerable web application. The next stage is then the execution of the attack.
- Phishing is used to try to lure users to either by posing as a safe download link or website. When the user opens it, it can automatically install malware onto the devices and then allows it to be infiltrated.
- The programming language that is most at risk of from a buffer overload is C and C++.
- Two types of natural disasters that can be detrimental to a business would be a flood and an earthquake.
Key terms
Buffer – contains data stored at random access memory for a short amount of time before it is used. Social engineering – the art of manipulating people so that confidential information can be found.
Comments
Post a Comment