Network security Flashcards

(29 cards)

1
Q

what is social engineering

A

The use of deception to manipulate individuals into indulging confidential or personal information that may be used for fraudulent purposes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

what is malware

A

any kind of malicious program that is installed on a computer system with the intention to cause damage and steal information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

what are the different types of malware

A

viruses
worms
trojans
ransomware
spyware
pharming

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

what are the different types of social engineering

A

phishing
pretexting
shouldering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

what is a virus

A

computer program hidden within another program

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

what are worms

A

they often create a back door so the hacker can take over an infected computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

what are trojans

A

programs that users are tricked into installing under the pretence that they are legitimate and useful

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

what is a ransomware

A

is malware that interferes with users operation of a computer unless a sum of money is paid

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

what is spyware

A

malware that comes packaged with other software such as free software that a user downloads

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

what is pharming

A

is a form of attack where users are directed to a fake website

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

what is phishing

A

uses fake emails and websites to trick people into giving away their sensitive data and information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

what is pretexting

A

criminal creates a scenario to persuade the victim to divulge info that they may not do otherwise

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

what is shouldering

A

watching over people as they enter their pins and passwords

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is a brute force attack

A

it is where the hacker attempts to crack a password by systematically trying different combinations of letters and numbers until the correct one is found

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

what is a Denial Of Service attack

A

designed to bring down servers by flooding them with superfluous bogus requests

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

what is a botnet

A

a collection of computers infected by maleware and controlled by hackers

17
Q

What are forms of data interception and theft

A

packet sniffing
man in the middle attacks

18
Q

what is packet sniffing

A

involves intercepting data using packet analysers as it is being transmitted across a network

19
Q

what are man in the middle attacks

A

A MITM attack involves intercepting a devices connection to the internet

20
Q

what is SQL

A

a language specifically designed for interactions with databases

21
Q

what is penetration testing

A

used to test a system or network in order to identify vulnerabilities in its security that an attacker could exploit

22
Q

what is anti malware software

A

it is designed to detect and remove malware

23
Q

what is a firewall

A

it is designed to prevent unauthorised access to a network ,and can be provided by either a hardware device or a piece of software

24
Q

what are user access levels

A

users of a network often arranged into different groups
each group have different user access rights that determine what they are permitted to access

25
what are passwords
help to prevent unauthorised access to a network or computer but are only effective if they remain secret and not easy to crack
26
what is Encryption
encrypting data means that it cannot be read by unauthorised persons, even if they manage to access the data . Encrypted data requires the correct key to be used in order to be decrypted
27
what is physical security
it is about protecting hardware, software , networks and data from physical actions that can cause harm
28
how to prevent malware
install anti virus and anti spyware software only download programs from trusted websites
29