Cybersecurity Threats and Network Concepts

Classified in Technology

Written at on English with a size of 3.12 KB.

Cybersecurity Threats: Semantic Attacks and Hoaxes

A semantic attack tricks users into believing they are interacting with a legitimate website, while they are actually interacting with a fake. A hoax is an email containing false information, often inviting the recipient to spread viruses or forward the email to collect email addresses for spam. Hoaxes themselves can be considered a form of semantic attack.

Access Control Measures for Computer Systems

Various access control measures can be implemented on computer systems:

  • Human Systems: Security guards.
  • Biometrics: Fingerprint, voice, and iris recognition.
  • Electronics: Security cameras, sensors, and electronic locks.
  • Logic: Magnetic cards and passwords.

Understanding Interrupt Requests (IRQ)

An Interrupt Request (IRQ) is a special communication from a physical device to the computer, signaling that the device requires immediate attention.

Networking Components

A networking component facilitates the physical and/or logical connection of two different networks.

Repeaters/Amplifiers and Their Limitations

Repeaters or amplifiers regenerate signals to their original state. They are used to extend network reach, but the cable segments they connect have maximum length limitations.

Dialup Lines

Dialup lines require establishing a call between two endpoints for communication.

Technologies Using Dialup Lines

Technologies that operate over dialup lines include:

  • PSTN (Public Switched Telephone Network)
  • ISDN (Integrated Services Digital Network)
  • GSM (Global System for Mobile Communications)
  • GPRS (General Packet Radio Service)

FON Networks and Foneras

The FON network provides free WiFi access globally. A Fonera is an 802.11b/g WiFi router modified to function as a captive access point.

Naked DSL

Naked DSL refers to an internet service provided without a traditional voice line.

Viruses and Spyware

A virus is malware that disrupts a computer's operation without the user's permission or knowledge. Spyware is software that collects information from a computer and transmits it to an external entity without the owner's knowledge or consent.

Passive vs. Active Attacks

In an active attack, the attacker aims to destroy or alter data on the computer. In a passive attack, information is obtained without modifying or altering the system.

Logical Security and Syntactic Attacks

Logical security involves applying logical methods to protect data, ensuring only authorized individuals have access at the appropriate times. Syntactic attacks involve exploiting vulnerabilities in systems.

Entradas relacionadas: