1.4 Forms of Attack Flashcards
1
Q
What are the different forms of attack?
A
- Malware
- Phishing
- Brute force
- Denial of service
- SQL injection
- Fata interception and theft
2
Q
What is malware?
A
- Software which is specifically designed to disrupt, damage, or gain unauthorised access to a computer system
- E.g. viruses, trojans, worms, spyware, horses, ransomware, adware, scareware
3
Q
What is phishing?
A
- The fraudulent practice of sending emails purporting to be from reputable companies in order to include individuals to reveal personal information
- E.g. to find passwords and credit card numbers
4
Q
What is a brute-force attack?
A
- A trial and error method of attempting passwords and pin numbers. Automated software is used to generate a large number of consecutive guesses
- E.g. By trying every word in the dictionary
5
Q
What is a Denial of Service attack (DoS)?
A
- Flooding a server with useless traffic causing the server to become overloaded and unavailable
6
Q
What is data interception and theft?
A
- The unauthorised act of stealing computer based information from an unknowing victim with the intent of compromising privacy or obtaining confidential information
- E.g. To sniff usernames and passwords
7
Q
What is a SQL injection?
A
A technique used to view or change data in a database by inserting additional code into a text input box, creating a different search string