Networks security Flashcards

1
Q

Social engineering-What is phishing?

A

When criminals send emails or texts to people claiming to be the real business. This could send you to a website so you can put in personal info

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Social engineering- What is pharming?

A

When a user is directed to a fake version of a website that looks like the real thing, with the aim that the user won’t notice

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Social Engineering-What is blagging?

A

When someone makes up a story or pretends to be someone they’re not to persuade the victim to share personal information or do things they wouldn’t normally do.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Social Engineering- What is shouldering?

A

Watching or observing a person’s activity (sometimes over their shoulder). Examples of this are spying someone’s PIN number at a cash machine.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Social Engineering- What are some warning signs of pharming?

A

In the website you could notice the following-Pop ups, image quality, text quality, and spelling mistakes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Malware- What is worms?

A

Worms are like viruses but they self replicate without any user help, meaning they can spread quickly.
They exploit weaknesses in network security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Malware-What are trojans?

A

Malware disguised as legitimate software. Unlike viruses and worms, trojans don’t replicate themselves, users install them not realising they have a hidden purpose.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Malware- What are viruses/ what do viruses do?

A

Viruses attach themselves (by copying themselves) to certain files e.g. exe files and autorun scripts.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Malware- What can viruses and worms do to the computer?

A

They can make the whole computer unusable.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Malware- What is spyware?

A

A software that observes your activities. A key logger tracks what you are typing, websites you go to, and they can get sensitive information e.g bank details, passwords.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Malware- How do viruses spread and how do users activate them?

A

Users spread them by copying infected files and activate them by opening infected files.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Wired and wireless- Benefits of wireless

A

Networks can be wired or wireless
Benefits of wireless networks:
•Cheap to set up
• Up to 50 metres
• Can connect loads of devices without needing extra hardware
• Doesn’t take up more space and is less messy because there are no extra wires

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Wired and wireless- Disadvantages of wireless

A
  • Connection is not as stable
  • More vulnerable to hacking
  • Slower than wired networks
  • Up to 50 megabits per second
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Why we need and importance of network security

A

Organisations must keep networks secure from hackers in order to protect sensitive information and comply with data protection laws

How well did you know this?
1
Not at all
2
3
4
5
Perfectly