1.4 Network Security Flashcards

(19 cards)

1
Q

Malware

A

Malware is malicious software designed to damage, disrupt, or gain unauthorised access to a computer system.
Examples: Viruses, worms, trojans, ransomware.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Virus

A

A computer program often hidden inside another program - it replicates and causes harm like deleting files and corrupting data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Worms

A

Self-replicating programs used to overload systems and consume bandwidth

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Trojan horses

A

Passes as a legitimate software. It contains malicious core - users are tricked into downloading this & it is then used to steal data or spy on users

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Ransomware

A

Malware that encrypts files/systems and the attacker demands a ransom to unlock them

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Spyware

A

Gathers information about a user and sends it back to the originator. - used to steal sensitive information like passwords

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Social engineering

A

Tricking people into giving away sensitive information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Social engineering eg

A

Phishing - fake emails/messages that look real & trick users into revealing their personal information through a fake link or other mechanism

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Brute force attack

A

When a program automatically tries many password combinations until it finds the correct one (used to break into accounts with simple/weak passwords)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Denial of service (DoS) attack

A

Floods a server or network with huge amounts of traffic to make it slow/crash making services unavailable to disrupt websites

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Data interception & theft - give 2 examples

A

When data is intercepted as it travels across a network - attackers can steal sensitive information this way
E.g. packet sniffing, shouldering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

SQL (Structured Query Language) injection

A

Where a hacker inserts malicious SQL code into a database query to access, modify, or delete data in a database illegally

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Penetration testing

A

A simulated attack on a system by white-hat hackers to find weaknesses before black-hat hackers do; this helps identify vulnerabilities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Physical security

A

-protects the physical parts of a network from damage (fire, flooding, theft, vandalism)
-involves: locks, restricted access to areas (server rooms), surveillance equipment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

User access levels

A

-controls which part of the network different users have access to
-helps limit the number of people with access to important data (prevents insider attacks)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Anti-malware software

A

-designed to find and stop malware from damaging a network (eg antivirus programs)
-companies use firewalls to block unauthorised access. They examine all data entering and leaving the network and block any potential threats

17
Q

Encrypting

A

The process of scrambling data so it can be sent securely over networks

18
Q

Firewall

A

Hardware or software based security which controls incoming and outgoing network traffic based on a set of rules

19
Q

Passwords

A

A string of characters used to gain access to a computer system