Network security Flashcards
(29 cards)
what is social engineering
The use of deception to manipulate individuals into indulging confidential or personal information that may be used for fraudulent purposes
what is malware
any kind of malicious program that is installed on a computer system with the intention to cause damage and steal information
what are the different types of malware
viruses
worms
trojans
ransomware
spyware
pharming
what are the different types of social engineering
phishing
pretexting
shouldering
what is a virus
computer program hidden within another program
what are worms
they often create a back door so the hacker can take over an infected computer
what are trojans
programs that users are tricked into installing under the pretence that they are legitimate and useful
what is a ransomware
is malware that interferes with users operation of a computer unless a sum of money is paid
what is spyware
malware that comes packaged with other software such as free software that a user downloads
what is pharming
is a form of attack where users are directed to a fake website
what is phishing
uses fake emails and websites to trick people into giving away their sensitive data and information
what is pretexting
criminal creates a scenario to persuade the victim to divulge info that they may not do otherwise
what is shouldering
watching over people as they enter their pins and passwords
What is a brute force attack
it is where the hacker attempts to crack a password by systematically trying different combinations of letters and numbers until the correct one is found
what is a Denial Of Service attack
designed to bring down servers by flooding them with superfluous bogus requests
what is a botnet
a collection of computers infected by maleware and controlled by hackers
What are forms of data interception and theft
packet sniffing
man in the middle attacks
what is packet sniffing
involves intercepting data using packet analysers as it is being transmitted across a network
what are man in the middle attacks
A MITM attack involves intercepting a devices connection to the internet
what is SQL
a language specifically designed for interactions with databases
what is penetration testing
used to test a system or network in order to identify vulnerabilities in its security that an attacker could exploit
what is anti malware software
it is designed to detect and remove malware
what is a firewall
it is designed to prevent unauthorised access to a network ,and can be provided by either a hardware device or a piece of software
what are user access levels
users of a network often arranged into different groups
each group have different user access rights that determine what they are permitted to access