5.2 Network security Flashcards

1
Q

Network security

A

Activities designed to protect a network and its data from threats such as viruses, hacker attacks, denial of service attacks, data interpretation and theft, and equipment failure.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Denial of service (DoS)

A

An attack on a network that attempts to prevent legitimate users from accessing its services.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Access control

A

This determines which users have access to which data, and what they are allowed to do with this.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Hacking

A

The act of gaining unauthorised access to a computer system and the data it contains.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Physical security

A

Controlling access to critical parts of a network using physical methods rather than software.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Malware

A

Short for ‘malicious software’. It is used as a generic term for any kind of software that is designed to disrupt the use of a computer system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

USB

A

Universal Serial Bus sockets found on most modern computer systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Cyberattack

A

Any kind of malicious attack on a network-connected device.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Social engineering

A

Any kind of attack on a computer system or network that exploits how people behave and respond to certian situations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Phishing

A

Attempting to get confidential information by sending a user a message that appears to come from a trustworthy person or organisation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Shoulder surfing

A

Gaining access to information by watching someone enter it in a computer system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Unpatched software

A

Software that hasn’t had the latest security updated applied to it, making it vulnerable to attack.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Code vulnerability

A

A computer program that has been written in such a way that it creates a security issue that may be taken advantage of to gain access to the computer system or data within it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Modular testing

A

Testing each block of code as it is completed to ensure the code works as expected.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Audit trail

A

A record of activities that have taken place on a computer system.
This record is generated automatically and will record what and who or what made the change.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly