1.4 Network Security Flashcards
(33 cards)
Different forms of network attack
Passive attack
Active attack
Insider attack
Brute force attack
Denial of Service attack (DoS)
Malware full form
Malicious Software
Malware
installed on a person’s device without their consent
Ways in which malware can access your computer
Viruses
Worms
Trojans
How viruses enter the computer
Attach to files. Activated when the user opens the file
What do viruses do?
Deletes/corrupts data
How Worms enter the computer
Like viruses, but self – replicate (without users interaction)
What do worms do?
Slows down the computer/creates backdoors
How trojans enter the computer
Looks like legitimate software. Users install them thinking that they are legitimate software
What do trojans do?
Slows down the computer/creates backdoors
Typical Actions of Malware
Ransomware
Scareware
Spyware
Ransomware
Encrypts users files and asks for money in exchange for the decryption key
Scareware
Tells the user that their computer is infected with viruses and provides malicious links to ‘solve’ them
Spyware
Secretly monitors user actions
Social Engineering
influencing/manipulating people to give sensitive information
Phishing
when criminals send emails/texts to people claiming to be from a well – known company, and asks the user to update their personal details -> these are sent to criminal
Normally have poor grammar.
Defense against Phishing
firewall – reduces no. of phishing emails recieved
SQL injection
SQL commands entered into website’s input box to gain access to database -> sensitive information
When will SQL injection work?
Will work if a website does not have strong input validation
What organisations can do to prevent network attacks
Penetration Testing
Physical Security
Passwords
User Access Levels
Anti - Malware Software
Encryption
Penetration Testing
Company employs specialists to simulate a potential attack on the network -> to find weaknesses that can be fixed
Physical Security
Protects the physical arts of a network
e.g. locks/passwords to restrict access to server room, surveillance cameras, motion sensors
Passwords
Help prevent unauthorised access to the network
Should be strong-> combination of letters, symbols, numbers
User Access Levels
Control which parts of the networks certain people can access
Help to limit number of people with access to sensitive information