1.4 Forms of Attack Flashcards

1
Q

What are the different forms of attack?

A
  • Malware
  • Phishing
  • Brute force
  • Denial of service
  • SQL injection
  • Fata interception and theft
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is malware?

A
  • Software which is specifically designed to disrupt, damage, or gain unauthorised access to a computer system
  • E.g. viruses, trojans, worms, spyware, horses, ransomware, adware, scareware
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is phishing?

A
  • The fraudulent practice of sending emails purporting to be from reputable companies in order to include individuals to reveal personal information
  • E.g. to find passwords and credit card numbers
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is a brute-force attack?

A
  • A trial and error method of attempting passwords and pin numbers. Automated software is used to generate a large number of consecutive guesses
  • E.g. By trying every word in the dictionary
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is a Denial of Service attack (DoS)?

A
  • Flooding a server with useless traffic causing the server to become overloaded and unavailable
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is data interception and theft?

A
  • The unauthorised act of stealing computer based information from an unknowing victim with the intent of compromising privacy or obtaining confidential information
  • E.g. To sniff usernames and passwords
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is a SQL injection?

A

A technique used to view or change data in a database by inserting additional code into a text input box, creating a different search string

How well did you know this?
1
Not at all
2
3
4
5
Perfectly