1.4 - Network Security Flashcards
What is malware?
Malicious software that is designed to disrupt, damage or gain unauthorised access to a computer system.
Examples of malware?
Viruses, Worms, Trojan Horses
What is a virus?
Malware that replicates code in other programs, before deleting, corrupting or modifying files.
What is a worm?
Malware that replicates itself in order to spread to other computers, so that it can slow down networks and computers.
What is a Trojan Horse?
Malware that pretends to be legitimate software, but has the purpose of causing damage, or gaining unauthorized access to a computer system.
What is ransomware?
Malware that holds a computer hostage (by locking/encrypting it) until money is paid.
What network vulnerabilities can hackers exploit?
Unpatched software; out-of-date anti-malware
What is social engineering?
The ability to obtain confidential information by asking people for it
What is phishing?
The fraudulent practice of sending emails, pretending to be from a reputable company, but the aim is to try and get users to reveal their confidential information.
What is a brute force attack?
Automated software used to generate and test every combination of password.
What is a Denial of Service attack?
Flooding a server with useless traffic, to make the server overloaded and unavailable.
What is a Data Interception (/Theft) attack?
The unauthorised act of stealing computer-based information from the victim, the aim is to obtain personal information.
How may an SQL injection be used as a form of attack?
Data records can be modified or added by inserting additional code into an input box.
How can we protect against network vulnerabilities?
Penetration testing
Anti-malware software
Firewalls
User access levels
Strong passwords
Encryption
Physical security
What is penetration testing?
Trying to break into a network to try to find security holes (identify possible entry points) in your own system, so they can be fixed.