1.4 Network Security Flashcards
(19 cards)
Malware
Malware is malicious software designed to damage, disrupt, or gain unauthorised access to a computer system.
Examples: Viruses, worms, trojans, ransomware.
Virus
A computer program often hidden inside another program - it replicates and causes harm like deleting files and corrupting data
Worms
Self-replicating programs used to overload systems and consume bandwidth
Trojan horses
Passes as a legitimate software. It contains malicious core - users are tricked into downloading this & it is then used to steal data or spy on users
Ransomware
Malware that encrypts files/systems and the attacker demands a ransom to unlock them
Spyware
Gathers information about a user and sends it back to the originator. - used to steal sensitive information like passwords
Social engineering
Tricking people into giving away sensitive information
Social engineering eg
Phishing - fake emails/messages that look real & trick users into revealing their personal information through a fake link or other mechanism
Brute force attack
When a program automatically tries many password combinations until it finds the correct one (used to break into accounts with simple/weak passwords)
Denial of service (DoS) attack
Floods a server or network with huge amounts of traffic to make it slow/crash making services unavailable to disrupt websites
Data interception & theft - give 2 examples
When data is intercepted as it travels across a network - attackers can steal sensitive information this way
E.g. packet sniffing, shouldering
SQL (Structured Query Language) injection
Where a hacker inserts malicious SQL code into a database query to access, modify, or delete data in a database illegally
Penetration testing
A simulated attack on a system by white-hat hackers to find weaknesses before black-hat hackers do; this helps identify vulnerabilities
Physical security
-protects the physical parts of a network from damage (fire, flooding, theft, vandalism)
-involves: locks, restricted access to areas (server rooms), surveillance equipment
User access levels
-controls which part of the network different users have access to
-helps limit the number of people with access to important data (prevents insider attacks)
Anti-malware software
-designed to find and stop malware from damaging a network (eg antivirus programs)
-companies use firewalls to block unauthorised access. They examine all data entering and leaving the network and block any potential threats
Encrypting
The process of scrambling data so it can be sent securely over networks
Firewall
Hardware or software based security which controls incoming and outgoing network traffic based on a set of rules
Passwords
A string of characters used to gain access to a computer system