Digital Security Basics Module 7
100 Questions
100 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

Are hackers able to exploit communication ports?

True

How do hackers exploit communication ports?

Hackers use a technique called port scanning to discover which ports are open on a device.

What is a port scan?

A port scan pings a packet of data to the port. If a reply is received, the port is open.

What is a firewall?

<p>A firewall is a device or software that is designed to block unauthorized access while allowing authorized communications.</p> Signup and view all the answers

What is a personal firewall?

<p>A personal firewall is a software-based deterrent against unauthorized port access.</p> Signup and view all the answers

Only one software-based firewall should be active, because firewalls have a tendency to conflict with each other.

<p>True</p> Signup and view all the answers

A router acts as a firewall to block connections that are not initiated inside a local network.

<p>True</p> Signup and view all the answers

Do I need NAT in addition to a personal firewall?

<p>Yes, NAT is the best line of defense against attacks that originate from the Internet.</p> Signup and view all the answers

What types of interception exploits are threats?

<p>Spyware, Adware, Keyloggers, and Man-in-the-Middle.</p> Signup and view all the answers

What is spyware?

<p>Any software that secretly gathers personal information without the victim's knowledge is classified as spyware.</p> Signup and view all the answers

What is adware?

<p>Adware monitors web browsing activity to supply ad-serving sites with data for targeted ads.</p> Signup and view all the answers

What are keyloggers?

<p>Keyloggers record keystrokes and send them to a hacker.</p> Signup and view all the answers

What is Man-in-the-Middle?

<p>An eavesdropping exploit where a third party intercepts communications.</p> Signup and view all the answers

How do man-in-the-middle attacks work?

<p>A third party intercepts communications between two entities without their knowledge.</p> Signup and view all the answers

What is an Evil Twin?

<p>An Evil Twin is a LAN server designed to look like a legitimate Wi-Fi hotspot.</p> Signup and view all the answers

How does the Evil Twin exploit work?

<p>Hackers set up a Wi-Fi hotspot to capture unsecured data from users.</p> Signup and view all the answers

What is address spoofing?

<p>Address spoofing changes an originating or destination address to redirect data flow.</p> Signup and view all the answers

What is an email address spoof?

<p>It changes the sender's address to mask the source of spam.</p> Signup and view all the answers

What is IP address spoof?

<p>It modifies the source address of data packets used in a denial-of-service attack.</p> Signup and view all the answers

What is a DNS address spoof?

<p>It changes the IP address that corresponds to a URL to redirect traffic.</p> Signup and view all the answers

The DNS address spoof changes the ARP (Address Resolution Protocol) routing table on a local area network.

<p>True</p> Signup and view all the answers

How does address spoofing affect browsing?

<p>By spoofing Google's IP address, users can be sent to a fake Google site.</p> Signup and view all the answers

Why is encryption vulnerable?

<p>The method of encrypting communication relies on a protocol called TLS that can be susceptible to attacks.</p> Signup and view all the answers

What is the problem with TLS?

<p>Digital certificates can be faked, compromising their trustworthiness.</p> Signup and view all the answers

How does a digital certificate hack work?

<p>By using DNS address spoofing, data can be tunneled through a malicious server.</p> Signup and view all the answers

Basic digital security depends on which two techniques?

<p>Encryption</p> Signup and view all the answers

How does encryption work?

<p>Encryption transforms a message or data file so that its contents are hidden from unauthorized readers.</p> Signup and view all the answers

An original message or file that has not yet been encrypted is referred to as plaintext or cleartext.

<p>True</p> Signup and view all the answers

An encrypted message or file is referred to as ciphertext.

<p>True</p> Signup and view all the answers

What is encryption?

<p>The process of converting plaintext into ciphertext.</p> Signup and view all the answers

What is decryption?

<p>The process of converting ciphertext into plaintext.</p> Signup and view all the answers

How is data encrypted?

<p>Data is encrypted by using a cryptographic algorithm and a key.</p> Signup and view all the answers

What is a cryptographic algorithm?

<p>A procedure for encryption or decryption.</p> Signup and view all the answers

What is a cryptographic key?

<p>A word, number, or phrase that must be known to encrypt or decrypt data.</p> Signup and view all the answers

A password is typically used as the key to encrypt and decrypt data.

<p>True</p> Signup and view all the answers

What can be encrypted?

<p>Data packets sent over networks, bank card numbers, email messages, storage volumes, and sensitive files can be encrypted.</p> Signup and view all the answers

How well does encryption protect files?

<p>There are various encryption methods, and some are more secure than others.</p> Signup and view all the answers

What is the encryption standard currently used worldwide?

<p>AES (Advanced Encryption Standard)</p> Signup and view all the answers

It is possible to crack AES, but the process is difficult and requires lots of computer power.

<p>True</p> Signup and view all the answers

What is user authentication?

<p>Any technique used to verify or confirm a person's identity.</p> Signup and view all the answers

Authentication techniques such as passwords, PINs, fingerprint scans, and facial recognition can prevent unauthorized access to the data.

<p>True</p> Signup and view all the answers

How does two-factor authentication increase security?

<p>It verifies identity based on two components, such as a password and a verification code.</p> Signup and view all the answers

What does a brute force attack use?

<p>Password-cracking software to generate every possible combination of letters, numerals, and symbols.</p> Signup and view all the answers

What does a dictionary attack help hackers to do?

<p>Guess your password by stepping through a dictionary containing common words and mutations.</p> Signup and view all the answers

What makes a password susceptible to a dictionary attack?

<p>Weak passwords such as passpass or computercomputer.</p> Signup and view all the answers

What makes a password susceptible to a brute force attack?

<p>Passwords are easier to crack if chosen from a smaller range of possibilities.</p> Signup and view all the answers

The number of possible passwords depends on factors that include the size of the character set and the length of the password.

<p>True</p> Signup and view all the answers

What is password entropy?

<p>A measure in bits of a password's unpredictability.</p> Signup and view all the answers

Passwords with higher entropy are more secure than passwords with low entropy.

<p>True</p> Signup and view all the answers

How does a password manager work?

<p>It keeps track of passwords so users don't have to memorize them.</p> Signup and view all the answers

What does a password strength meter indicate?

<p>The strength of a password and its resistance to attacks.</p> Signup and view all the answers

The encrypted file that stores user IDs and passwords is protected by a master password.

<p>True</p> Signup and view all the answers

Passwords stored locally are tied to the device on which they are created.

<p>True</p> Signup and view all the answers

Malware is also a component of cyberwarfare attacks that pose a threat to national security.

<p>True</p> Signup and view all the answers

What are malware threats?

<p>Any computer program designed to surreptitiously enter a digital device.</p> Signup and view all the answers

What is a payload or malware exploit?

<p>The action carried out by malware code.</p> Signup and view all the answers

What can malware be used for?

<p>Deleting files, recording keystrokes, allowing remote control of a device, and more.</p> Signup and view all the answers

When was the first computer virus designed to affect personal computers appear?

<p>In 1982.</p> Signup and view all the answers

What is a virus?

<p>A set of self-replicating program instructions that attaches itself to a legitimate executable file.</p> Signup and view all the answers

What are logic bombs?

<p>Viruses that deliver their payloads in response to some other system event.</p> Signup and view all the answers

What are time bombs?

<p>Viruses that deliver their payloads on a specific date.</p> Signup and view all the answers

What is code injection?

<p>The process of modifying an executable file or data stream by adding additional commands.</p> Signup and view all the answers

How does a virus spread?

<p>By exchanging infected files, email attachments, and through social networking sites.</p> Signup and view all the answers

What is side-loading?

<p>A process where an app from a source other than an official app store is installed.</p> Signup and view all the answers

What is a rootkit?

<p>Any code that hides the existence of processes and privileges.</p> Signup and view all the answers

Modern rootkits are used to hide malicious code by replacing parts of the operating system with modified code.

<p>True</p> Signup and view all the answers

What is a worm?

<p>A small self-replicating program designed to carry out unauthorized activities.</p> Signup and view all the answers

How can worms enter a device?

<p>Through security holes in browsers, email attachments, and infected links.</p> Signup and view all the answers

A mass-mailing worm spreads by sending itself to every address in the worm's contact list.

<p>True</p> Signup and view all the answers

What does an Internet worm look for?

<p>Vulnerabilities in operating systems, open communications ports, and JavaScripts.</p> Signup and view all the answers

What does a file-sharing worm do?

<p>Copies itself into a shared folder under an innocuous name.</p> Signup and view all the answers

Today, more than 80% of malware infections are trojans.

<p>True</p> Signup and view all the answers

How do trojans differ from viruses and worms?

<p>Trojans do not spread themselves; they rely on users to install them.</p> Signup and view all the answers

What are trojans?

<p>Programs that masquerade as useful utilities but perform harmful actions.</p> Signup and view all the answers

What can trojans contain?

<p>Viruses, code to take control of a device, or routines called droppers.</p> Signup and view all the answers

What is a dropper?

<p>A tool designed to deliver or 'drop' malicious code into a device.</p> Signup and view all the answers

What is the difference between a dropper and code injection?

<p>A dropper installs a malicious program, while code injection adds malicious code to an existing program.</p> Signup and view all the answers

Antivirus software is a type of utility software that looks for and eliminates malware.

<p>True</p> Signup and view all the answers

What is a virus signature?

<p>A section of code that uniquely identifies a malware exploit.</p> Signup and view all the answers

How well does heuristic analysis work?

<p>It requires time and system resources to examine files.</p> Signup and view all the answers

Heuristics may produce false positives that mistakenly identify a legitimate file as malware.

<p>True</p> Signup and view all the answers

What happens when malware is detected?

<p>Antivirus software can try to remove, quarantine, or delete the malware.</p> Signup and view all the answers

How dependable is antivirus software?

<p>Today's antivirus software is quite dependable but not infallible.</p> Signup and view all the answers

What is the purpose of a manual scan?

<p>To scan specific files initiated by a user.</p> Signup and view all the answers

What's a virus hoax?

<p>An email warning about a supposed new virus, often leading to unwanted downloads.</p> Signup and view all the answers

What is the risk of online intrusions?

<p>When an unauthorized person gains access to a digital device via the Internet.</p> Signup and view all the answers

What are the characteristics of online intrusions?

<p>Most begin with malware setting up a backdoor for future access.</p> Signup and view all the answers

What are the steps of an online intrusion?

<p>Malware enters a device, creates a backdoor, opens communication with a hacker, and executes commands.</p> Signup and view all the answers

Are there different types of intrusions?

<p>True</p> Signup and view all the answers

What is a RAT?

<p>Malware that disguises itself as legitimate software to establish a secret link to a hacker.</p> Signup and view all the answers

What is a backdoor?

<p>An undocumented method of accessing a digital device.</p> Signup and view all the answers

What is ransomware?

<p>A virus that encrypts user storage until payment is made to unlock it.</p> Signup and view all the answers

What is a botnet?

<p>A network of compromised devices controlled by hackers.</p> Signup and view all the answers

Botnets have been used to carry out massive DDoS attacks.

<p>True</p> Signup and view all the answers

What is DDoS?

<p>A distributed denial of service attack.</p> Signup and view all the answers

A botmaster controls a network of victims' computers using IRC channels for communication.

<p>True</p> Signup and view all the answers

Commands from botmaster include:

<p>Click fraud, DDoS, spam, mine bitcoins, and crack encryption.</p> Signup and view all the answers

Does antivirus software protect devices from intrusions?

<p>It can prevent some, but not all, intrusions.</p> Signup and view all the answers

What is a zero-day attack?

<p>An attack that exploits previously unknown vulnerabilities.</p> Signup and view all the answers

On-access scans are also called:

<p>Real-time protection, background scanning, and autoprotect.</p> Signup and view all the answers

Study Notes

Digital Security Fundamentals

  • Basic digital security relies on encryption and authentication for protection.
  • Encryption hides information from unauthorized readers by transforming messages or files.
  • The original unencrypted content is known as plaintext or cleartext, while the encrypted content is termed ciphertext.

Encryption and Decryption

  • Encryption: The process of converting plaintext into ciphertext.
  • Decryption: Reverses encryption, converting ciphertext back to plaintext.
  • Data encryption utilizes a cryptographic algorithm paired with a cryptographic key for secure communication.

Cryptographic Key and Algorithms

  • A cryptographic key is typically a word or number necessary for encryption/decryption.
  • Cryptographic algorithms define the methods used for encryption and decryption.

Passwords and Security

  • Passwords function as keys, playing a crucial role in data protection.
  • Various data types can be encrypted, including personal data, email communications, and entire storage volumes.
  • Password strength hinges on complexity; weak passwords (e.g., "passpass") are easily crackable.

Attack Methods

  • Brute Force Attack: Attempts every possible password combination, often requiring substantial time and resources.
  • Dictionary Attack: Uses common words and phrases to guess passwords, leveraging known weaknesses.

Security Measures

  • Employing two-factor authentication enhances security by requiring two verification components.
  • Password strength meters evaluate password security against brute force and dictionary attacks.

Malware and Cyber Threats

  • Malware encompasses harmful programs designed to infiltrate devices, including viruses, worms, and trojans.
  • A virus replicates by attaching itself to legitimate files; worms are standalone programs that spread autonomously.
  • Trojan horses masquerade as legitimate software but lead to malicious activities upon installation.

Specific Types of Malware

  • Ransomware encrypts user data until a ransom is paid for access.
  • Rootkits hide malicious processes from detection, often modifying operating system components.
  • Backdoors allow unauthorized remote access to victim systems, often utilized by RAT (Remote Access Trojans).

Intrusions and Defense Strategies

  • Online intrusions often initiate through malware, which opens backdoors for hackers.
  • Botnets consist of networks of compromised devices controlled by a hacker, often utilized for DDoS attacks.
  • Firewalls block unauthorized access and can be software-based (personal firewalls) or hardware-based (network routers).

Protection and Reliability

  • Antivirus software detects and eliminates malware but may not catch sophisticated threats like zero-day exploits.
  • Manual scans help users check for infections if there are suspicions of malware incidents.

Exploiting Vulnerabilities

  • Hackers conduct port scanning to identify open communication ports on devices.
  • Spyware collects user data without consent, while adware monitors web activity to serve targeted ads.

Threat Prevention

  • Systems utilizing Network Address Translation (NAT) enhance security against outside attacks, complementing personal firewalls by addressing internal threats.

Keyloggers

  • Keyloggers are a type of spyware that record keystrokes and transmit the information to hackers.
  • They are commonly used by identity thieves and industrial spies to obtain user passwords and access accounts.

Man-in-the-Middle Attacks

  • A Man-in-the-Middle (MITM) attack involves a third party intercepting communication between two entities without their knowledge.
  • Types of MITM attacks include Evil Twins, address spoofing, digital certificate hacks, and IMSI catchers.
  • A third party can either passively monitor communications or actively modify data during transfer.

Evil Twin Exploit

  • An Evil Twin is a fraudulent Wi-Fi hotspot that mimics a legitimate network to deceive users.
  • Hackers set up unsecured Wi-Fi hotspots to capture data from users, including online banking details and social media passwords.

Address Spoofing

  • Address spoofing involves altering the originating or destination address of data to redirect communication.
  • Various types include email address spoofing, IP address spoofing, and DNS address spoofing.

Spoof Types

  • Email address spoofing disguises the sender's address, often used in spam.
  • IP address spoofing modifies source IP addresses in denial-of-service (DoS) attacks.
  • DNS address spoofing changes the IP address associated with a URL, redirecting victims to fraudulent websites.

ARP Address Spoofing

  • ARP spoofing alters the routing table on a local area network, redirecting traffic through a malicious device.

Address Spoofing Impact on Browsing

  • Spoofing of Google’s IP address by authorities can redirect users to fake sites, which may block access to controversial content.

Vulnerability of Encryption

  • Encryption of client-server communication relies on TLS (Transport Layer Security) and digital certificates to verify server identity.
  • Public keys are used by clients to encrypt messages sent to servers.

Issues with TLS

  • Digital certificates, which validate server identities, can be faked, creating security vulnerabilities.
  • A valid certificate is signed by an official certificate authority, while a fake may appear legitimate but lacks a valid signature.

Digital Certificate Hacking

  • Digital certificate hacks can involve DNS address spoofing, which routes all data from users through malicious servers, potentially enabling surveillance or censorship.

Studying That Suits You

Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

Quiz Team

Description

Explore the essential concepts of digital security in this Module 7 quiz. Test your knowledge on encryption, authentication, and plaintext definitions through flashcards designed for effective learning.

More Like This

Use Quizgecko on...
Browser
Browser