Podcast
Questions and Answers
What defines a vulnerability in the context of computer threats?
What defines a vulnerability in the context of computer threats?
- A type of computer virus that spreads between systems.
- A weakness that makes a threat possible. (correct)
- An attempt to impersonate a legitimate user.
- A malicious action that exploits an existing threat.
Which of the following statements about hackers is true?
Which of the following statements about hackers is true?
- All hackers aim to cause harm to systems.
- Hackers only work for government organizations.
- Hackers are synonymous with crackers.
- Hackers seek knowledge or engage in harmless pranks. (correct)
What is the main objective of black-hat hackers?
What is the main objective of black-hat hackers?
- To experiment with computer systems legally.
- To exploit vulnerabilities for personal gain. (correct)
- To collaborate with organizations on security issues.
- To improve computer security for users.
Which term best describes malicious programmers who destroy data after unauthorized access?
Which term best describes malicious programmers who destroy data after unauthorized access?
How can a computer attack be defined?
How can a computer attack be defined?
What distinguishes gray-hat hackers from other types of hackers?
What distinguishes gray-hat hackers from other types of hackers?
What happens when a computer system is infected with a virus?
What happens when a computer system is infected with a virus?
What is the primary function of White-Hat Hackers?
What is the primary function of White-Hat Hackers?
Which statement best describes the legality of Black-Hat Hacking?
Which statement best describes the legality of Black-Hat Hacking?
What primary function does a Backdoor Trojan serve?
What primary function does a Backdoor Trojan serve?
What is a characteristic of Gray-Hat Hackers?
What is a characteristic of Gray-Hat Hackers?
Which of the following best describes the purpose of a Downloader Trojan?
Which of the following best describes the purpose of a Downloader Trojan?
Which of the following is a sign of computer virus infection?
Which of the following is a sign of computer virus infection?
Which type of virus infects the boot sector of disks?
Which type of virus infects the boot sector of disks?
Which mitigation strategy is NOT recommended for avoiding Trojan horse infections?
Which mitigation strategy is NOT recommended for avoiding Trojan horse infections?
What happens during a Direct Action Virus infection?
What happens during a Direct Action Virus infection?
What type of Trojan specifically targets network overloads to cause a denial of service?
What type of Trojan specifically targets network overloads to cause a denial of service?
Which type of Trojan is designed to mislead users into thinking their device is protected by legitimate antivirus software?
Which type of Trojan is designed to mislead users into thinking their device is protected by legitimate antivirus software?
Which of the following is NOT a sign of a computer virus infection?
Which of the following is NOT a sign of a computer virus infection?
What characterizes Resident Viruses?
What characterizes Resident Viruses?
What might be a first indication of a system being infected with a virus?
What might be a first indication of a system being infected with a virus?
What distinguishes a computer worm from a virus?
What distinguishes a computer worm from a virus?
Which method is NOT a viable option for data backup?
Which method is NOT a viable option for data backup?
Which of the following best describes a multipartite virus?
Which of the following best describes a multipartite virus?
Which of the following is a role-based function related to authorization?
Which of the following is a role-based function related to authorization?
What is the primary function of computer worms?
What is the primary function of computer worms?
How does an overwrite virus function?
How does an overwrite virus function?
What makes polymorphic viruses particularly challenging to detect?
What makes polymorphic viruses particularly challenging to detect?
Which technique is commonly employed to protect against computer worms?
Which technique is commonly employed to protect against computer worms?
What is a unique feature of space filler viruses?
What is a unique feature of space filler viruses?
What is the main consequence of a computer worm on a system?
What is the main consequence of a computer worm on a system?
Which method is NOT commonly associated with virus spread?
Which method is NOT commonly associated with virus spread?
What is one characteristic of email worms?
What is one characteristic of email worms?
What role does anti-virus software play in virus mitigation?
What role does anti-virus software play in virus mitigation?
Which of the following best describes accountability in security measures?
Which of the following best describes accountability in security measures?
What distinguishes a file infector virus from other types?
What distinguishes a file infector virus from other types?
Which backup method involves storing data on a remote server accessible via the internet?
Which backup method involves storing data on a remote server accessible via the internet?
Which virus type is specifically known to exploit empty spaces within a file?
Which virus type is specifically known to exploit empty spaces within a file?
What is a critical distinction between how viruses and worms spread?
What is a critical distinction between how viruses and worms spread?
Which of the following represents a method through which viruses commonly exploit human behavior?
Which of the following represents a method through which viruses commonly exploit human behavior?
Flashcards
What is a computer threat?
What is a computer threat?
A potential occurrence that could harm a computer system.
What is a vulnerability?
What is a vulnerability?
A weakness in a computer system that allows a threat to be realized.
What is an attack?
What is an attack?
An action that exploits a vulnerability or enacts a threat.
What is a computer virus?
What is a computer virus?
Signup and view all the flashcards
Who are hackers?
Who are hackers?
Signup and view all the flashcards
Who are crackers?
Who are crackers?
Signup and view all the flashcards
What are white-hat hackers?
What are white-hat hackers?
Signup and view all the flashcards
Who are Black-Hat Hackers?
Who are Black-Hat Hackers?
Signup and view all the flashcards
What are Gray-Hat Hackers?
What are Gray-Hat Hackers?
Signup and view all the flashcards
What is a Boot Sector Virus?
What is a Boot Sector Virus?
Signup and view all the flashcards
What is a Direct Action Virus?
What is a Direct Action Virus?
Signup and view all the flashcards
What is a Resident Virus?
What is a Resident Virus?
Signup and view all the flashcards
What is a Multipartite Virus?
What is a Multipartite Virus?
Signup and view all the flashcards
What is an Overwrite Virus?
What is an Overwrite Virus?
Signup and view all the flashcards
What is a Polymorphic Virus?
What is a Polymorphic Virus?
Signup and view all the flashcards
Resident Virus
Resident Virus
Signup and view all the flashcards
Multipartite Virus
Multipartite Virus
Signup and view all the flashcards
Overwrite Virus
Overwrite Virus
Signup and view all the flashcards
Polymorphic Virus
Polymorphic Virus
Signup and view all the flashcards
File Infector Virus
File Infector Virus
Signup and view all the flashcards
Space Filler Virus
Space Filler Virus
Signup and view all the flashcards
Email Attachments
Email Attachments
Signup and view all the flashcards
Internet Downloads
Internet Downloads
Signup and view all the flashcards
Removable Media
Removable Media
Signup and view all the flashcards
Software Vulnerabilities
Software Vulnerabilities
Signup and view all the flashcards
Authentication
Authentication
Signup and view all the flashcards
Authorization
Authorization
Signup and view all the flashcards
Accountability
Accountability
Signup and view all the flashcards
Data Backup
Data Backup
Signup and view all the flashcards
Computer Worm
Computer Worm
Signup and view all the flashcards
Email Worms
Email Worms
Signup and view all the flashcards
What is a Backdoor Trojan?
What is a Backdoor Trojan?
Signup and view all the flashcards
What is a Rootkit Trojan?
What is a Rootkit Trojan?
Signup and view all the flashcards
What is a Downloader Trojan?
What is a Downloader Trojan?
Signup and view all the flashcards
What is a Mailfinder Trojan?
What is a Mailfinder Trojan?
Signup and view all the flashcards
What is a Fake Antivirus Trojan?
What is a Fake Antivirus Trojan?
Signup and view all the flashcards
Study Notes
Computer Information Threats
- A threat is any potential occurrence, malicious or otherwise, that could harm an asset (computer). It is any bad thing that can happen to your computer.
- A vulnerability is a weakness that makes a threat possible. This can be from poor design, configuration mistakes, or inappropriate and insecure coding.
- An attack is an action that exploits a vulnerability or enacts a threat. Examples include sending malicious input to an application or flooding a network.
Types of Information Threats: Viruses
- A computer virus is a computer program or software that enters the computer system by attaching itself to another computer program and spreads itself across the system.
- If the spread is successful, the affected areas are then "infected" with the computer virus.
- Hackers and crackers are two types of people who create computer viruses.
Hackers vs. Crackers
- Hackers use their technical skills to enter computer systems without permission. Often, they are computer enthusiasts who break in to learn more or for pranks. Many hackers work with government bodies in solving cases.
- Crackers are malicious programmers who gain unauthorized access to computer systems. They destroy confidential data and create destructive programs, like viruses.
White-Hat, Black-Hat, and Gray-Hat Hackers
- White-hat hackers find vulnerabilities in computer networks for organizations and governments; they are often paid employees. White-hat hacking is legal.
- Black-hat hackers hack systems illegally for personal gain. This is highly skilled and often criminal activity and is illegal.
- Gray-hat hackers have a combination of black-hat and white-hat activities; they find issues in systems without permission. They sometimes ask for payment to fix the issue(s), but this is not always the case. Sometimes, gray-hat hacking violates the law.
Signs of Computer Virus Infection
- Speed of System: The time taken to open applications and system processing is slower.
- Pop-up Windows: Too many unexpected pop-up windows appear on the screen.
- Self-Execution of Programs: Files or programs open automatically in the background.
- Log Out from Accounts: The user is logged out from accounts and protected sites.
- Crashing of Device: The device crashes and stops working.
Types of Computer Viruses
- Boot Sector Virus: Infects the boot sector of floppy disks or the Master Boot Record (MBR).
- Direct Action Virus: Attaches itself directly to .exe or .com files and enters the device during execution. Also known as Non-Resident.
- Resident Virus: Saves itself in the computer's memory and infects other files and programs when the originating program isn't running. Hard to remove.
- Multipartite Virus: Can attack both boot sector and executable files.
- Overwrite Virus: Completely removes the existing program and replaces it with malicious code. Replaces the host code.
- Polymorphic Virus: Modifies its code to evade anti-virus detection.
- File Infector Virus: Infects executable files and spreads to other files and programs.
- Space Filer Virus: Fills in empty space of a file with viruses. Also known as cavity virus.
Virus Spread and Infection Ways
- Email Attachments
- Internet Downloads
- Removable Media
- Network Transmission
- Drive-by Downloads
- Software Vulnerabilities
Virus Mitigation
- Antivirus software: Detects and removes harmful software.
- Firewalls: Protects from malicious software.
Computer Worms
- A standalone malware program that replicates itself to spread to other computers within a network. It relies on security failures to access other computers.
- Spread: Often uses a computer network to spread.
Trojan Horse
- Malware that hides its true function, often disguising itself as legitimate software to gain unauthorized access to a device.
- Malware that acts covertly and is often used for opening backdoors, takes control of the affected device, exfiltrates user data, and downloads/runs other malicious software.
Ransomware
- Malware that prevents users from accessing their system or files. Then demands ransom payment to gain access.
Spyware
- A program that gathers confidential and sensitive information from a network.
- Information may include emails, passwords and credit card information.
Social Engineering Attacks
- Methods used to manipulate people into taking certain actions, like giving up sensitive information or money.
Discussion Points
- Details of social engineering attacks
- Social engineering attack lifecycle
- Types of social engineering attacks
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.