<<

Cybersecurity | Revision Mat

Shoulder Surfing SQL Injection DoS Attack Password-based IP Address Spoofing Social Engineering

- This type of attack uses direct - This is a technique where malicious - This is a technique where malicious - The following types of password - IP address spoofing involves an - Social engineering involves tricking observation to get information from users can inject SQL commands into users can inject SQL commands into Virus attacks can be carried out by an attacker changing the IP address of a user into giving out sensitive a user. existing SQL statements. existing SQL statements. individual / computer program: a website so that a visitor who types information such as a password by in the URL of a website is taken to a posing as a system administrator. fraudulent website. - It is relatively simple to perform as - Injected SQL commands can alter - Injected SQL commands can alter - Dictionary Attack it can involve standing next to SQL statements and compromise SQL statements and compromise Worm - Brute Force Attack - This type of attack is normally someone and watching them as the security of information held in the security of information held in - The attacker can then use this carried out through emails. they fill out a form, or enter a PIN systems. database systems. - Guess website to steal sensitive data. number. Types of MethodsForms of of Protection Against MalwareTypes of Methods of Identifying Malware Vulnerabilities in Computer Systems Methods of Identifying Vulnerabilities in Computer Systems In Mathematics- 4 Virusx 2 is the. Protection Software Virus Trojan - Footprinting - Worm Trojan - Ethical Hacking - Operating System Updates Keylogger - Penetration Testing - Latest Version of Web Browsers Adware Keylogger - - Identify Phishing Emails Spyware

Cybersecurity refers to the range of measures that can be undertaken to protect computer systems, networks and data from unauthorised access or cyberattack. are primarily carried out through the use of malware. Malware is the term used to describe malicious software. This type of software is specifically designed to disrupt, damage, or gain unauthorized access to a computer system. Cybersecurity | Glossary

Access levels Archiving Cybersecurity Cyberattacks Malware • User access levels are a method used • Encryption is the process of using an • Archiving is the process of storing data • Cybersecurity refers to the range of • Cyberattacks are attacks carried out on • Malware is a term used to describe on a network to determine what read algorithm to transform information to which is no longer in current or measures that can be undertaken to a network by the use of malware. software which is designed to disrupt and write permissions a user can have. make it unreadable for unauthorized frequent use. It is held for security, protect computer systems, networks and potentially damage a computer users. legal or historical reasons. and data from unauthorised access or system. cyberattack.

Virus Worm Trojan Keyloggers Adware Spyware • A virus is a program that can replicate • Worms are self-replicating programs • A Trojan is a program that appears to • This type of malware records the key • These programs inject adverts into • Spyware is software which can be used itself and spread from one system to that identify vulnerabilities in operating perform a useful function for a user, presses from a user on a computer pages and programs on a user’s to collect a user’s data without their another by attaching itself to host files. systems and enable a hacker to gain but also provides a ‘’ that system. These records are then studied computer system with the aim that the knowledge. remote control of an infected computer enables data to be stolen. by a third party so that they can easily creator would be able to get system. identify and exploit personal and advertising revenue from the adware sensitive data such as passwords. program.

Virus protection software Shoulder surfing SQL injection DoS attack Dictionary attack Brute force attack • This is a piece of software that is loaded • Shoulder surfing involves using direct • This is a technique where malicious • A denial of service (DoS) attack doesn’t • This type of password attack uses a • This type of password attack is similar into memory when a computer system observation to get information. users can inject SQL commands into attempt to break system security it simple file containing words found in a to a dictionary attack but is able to is running. It monitors activity the existing SQL statements. attempts to make your website and dictionary. This attack uses exactly the detect non-dictionary words by computer system for the signs of a servers unavailable to users. kind of words that many people use as working through all possible virus infection. their password. alphanumeric. combinations from aaa1 to zzz10

IP address spoofing Social engineering Footprinting • IP address spoofing involves an attacker • Social engineering involves tricking a • Footprinting involves gathering all changing the IP address of a website so user into giving out sensitive available information about a computer that a visitor who types in the URL of a information such as a password by system. A penetration tester should website is taken to a fraudulent posing as a system administrator. then be able to use this information to website. discover how much detail a potential attacker could find out about that computer system.