Network Security Flashcards
What is malware?
Software that is specifically designed to disrupt, damage, or gain unauthorized access to a computer system
Name 6 types of malware
- Ransomware
- Spyware
- Adware
- Trojan
- Virus
- Worms
What is ransomware?
Malware where the hacker will prevent you from accessing your data until a ransom is paid
What is spyware?
A program that monitors user activities and sends the information back to a hacker
What is a trojan?
Malware that downloads onto a device disguised as a legitimate program
What is a computer virus?
Self replicating malware that often causes damage by deleting or modifying data
What is a worm?
Self replicating malware often not causing damage until it reaches it’s intended target
What technical vulnerabilities could a computer have that a hacker could exploit if not dealt with?
- Unpatched software
- Out of date anti malware
What is unpatched software?
Software that hasn’t been updated to the latest standard.
What is social engineering?
Deception to try to gain personal information
Name 2 examples of social engineering
- Phishing
- Shoulder surfing
What is phishing?
Emails that try to trick users into giving away personal details
What is shoulder surfing?
The ability to get information or passwords by observing as someone types them in
Describe 2 examples of shoulder surfing?
- Looking over someone’s shoulder
- Using a CCTV camera
What indicators are that an email is a phishing email?
- They don’t say your name
- Strange email address
- A forged link
- Requesting personal information
- A sense of urgency
- Poor spelling and grammar
What is a brute force attack?
Trying all possible passwords until the correct one is found
What is a Denial of Service (DoS) attack?
Flooding a server or network with pointless requests so that it either fails or slows down
What is Distributed Denial of Service (DDoS) attack?
A DoS attack using multiple devices (zombies) to send requests
What is data interception and theft?
Stealing data or intercepting it with a man-in-the-middle attack
What is a SQL injection?
Typing code into a website to break into the database to retrieve information
What is penetration testing?
Hacking your system to test for vulnerabilities, which will then be fixed
What is a network policy?
A policy that provides rules and guidelines on what network users can and cannot do
What are user access levels?
Different levels of permissions given to users to access facilities on a computer
What is encryption?
Converting readable data to an encoded version that can only be decoded with a key