network threats Flashcards

(20 cards)

1
Q

what is malware

A

software that replicates and fills up disk space and causes damage to data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

4 types of malware

A

trojan, worm, ransomware and spyware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

what does the trojan do

A

o Trojan – malware disguised as legitimate software and once installed, they damage data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

what does the worm do

A

o Worm – software that replicates across a network and uses up all the bandwidth.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

what does ransomware do

A

o Ransomware – encrypts user’s data until money is paid for a decryption key.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

what does spyware do

A

o Spyware – secretly monitors user’s actions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

what is social engineering

A

Social Engineering - using deception to manipulate users to gain personal data:

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

2 types of social engineering and description

A

o Phishing – fake emails are sent to a person so that they give away personal data.
o Shoulder Surfing – watching a person entering a password and using it to access an account.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

what is brute force attack and what can happen to the user’s account

A

Brute Force Attack:
 Uses automated software to crack passwords by trying all the possible combinations.
 Gains access to a user’s account so they can view/edit/delete private data.
 They can install malware or block your access to your account.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

how to prevent brute force attack

A

 To prevent this, you can use firewalls, strong passwords, and two-step verification.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

what does (DOS/DDOS) stand for and what does it do

A

Distributed) Denial of Service
 A server is flooded with more requests than it can process.
 Server cannot respond so it crashes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Data Interception and Theft

A

data that is sent is intercepted by a third-party.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

what is SQL injection and how can it be prevented

A

 Uses SQL commands typed into a websites input box to gain access to databases in that network.
 websites use input validation that don’t permit characters used in SQL injections.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

what is penetration testing

A

Penetration Testing:
 Organisations employ specialists to simulate potential attacks on their network.
 Used to identify weaknesses/vulnerabilities in the network’s security so that they can be addressed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

what is the anti malware software and how does it prevent vulnerabilities

A

 Scans the computer for malware and alerts the user.
 Requests actions such as stopping the download of malware to protect data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

what is encryption and how does this prevent vulnerabilities

A

Encryption:
 Scrambles data using an algorithm that cannot be understood if intercepted.
 Only authorised users can access personal data as a key is needed to decrypt it.
 Required to follow Data Protection Act.

17
Q

what are used access levels and how what do they prevent

A

 Different users have restricted access to data eg only read and not write which prevents accidental changes

18
Q

how do passwords prevent vulnerabilities and what happens after a set number of failed attempts

A

must be correctly entered to gain access so stronger passwords make it harder for a brute-force attack to succeed.
 Account/device is locked

19
Q

what is physical security

A

Physical Security:
o e.g. Locks, Alarms, Security guards, CCTV, Keycard entry, Passcode/Biometric entry to a room.

20
Q

what do firewalls do to prevent vulnerabilities

A

Firewalls:
 Examines ingoing and outgoing traffic on a network and blocks unauthorised access.