1.4 Network security Flashcards
What are the types of attacks
Malware
Phishing
Brute force attack
(D)DoS
Data interception and theft
SQL injection
What is malware with examples
Software that is designed to hack a system
Viruses - programs embedded (hidden) within other files. They replicate themselves and become part of other programs. Viruses often cause damage by deleting or modifying data
Trojans - programs which pretend to be legitimate but in reality are malware. Trojans cannot spread by themselves Instead they deceive a user into installing the program
What is phishing
Emails that try to trick users into giving away personal details, e.g. the email pretends to be a genuine message and tries to deceive the user into following a link to a website that looks like the real company so that they enter their information
What is brute force attack
A program is used to find a password by trying all possible combinations of characters until the correct one is obtained
What is (D)Dos ((Distributed) Denial of Service)
A computer (or many computers) is used to prevent a server from performing its tasks by sending many requests
What is data interception and theft
The data is taken during transmission and it is sent to the hacker
What is SQL injection
SQL code is entered as a data input
What are the prevention methods
Penetration testing
Anti malware software
Firewalls
User access levels
Strong passwords
Encryption
What is penetration testing
When an authorised user (usually an external organisation) who finds weak points in the security and exploits them. When they’re done, they report back to their client
What is anti malware software
Detects malware that has been installed. Prevents malware from being installed. Removes malware from the system
What is a firewall
Monitors data traffic going into and out of a computer or network, and either allows the traffic to pass through or blocks it
What is user access levels
Users should only be able to access the file that they ned, e.g. a student doesn’t need access to the school’s finance
What are strong passwords
Requires at least eight characters, including at least one uppercase letter, one number and one special character
What is encryption
The data (plaintext) is scrambled into different characters so no one will understand it unless they know the key