1.4 Network Security Flashcards
Virus -
A malicious piece of software that infects other files. It can only replicate if the file is opened and run. A virus will replicate and infect other susceptible files, but requires human computer users to spread them from computer to computer.
Worm -
A complete standalone piece of malicious software that can spread by itself without any human interaction.
Trojan -
A piece of malicious software that tricks users into downloading by making it look like it is something useful.
Denial of Service (Dos) attack -
Any attack on a system that denies you (and others) of a service.
Distributed Denial of Service (DDoS) attack -
Infecting hundreds or thousands of computers with Trojans that can all be triggered at once to send a flood of IP data packets to a server and overwhelm it and crash
Brute Force attack -
Guessing thousands (or millions or even billions!) of password combinations until they crack the password. This is sometimes called a “dictionary attack” because it goes through all the words of the dictionary first.
Phishing –
emails sent to numerous email addresses in the hope that some of the recipients will fool for the scam.
Social Engineering -
Any method that hackers use to trick PEOPLE into either downloading malicious software or giving out personal information. Phishing is a form of social engineering.
SQL Injection -
when a hacker types SQL code into the input box of a form and submits it. The SQL code could allow a hacker to view usernames and passwords stored in a database.
Data interception and theft -
Cyber criminals (hackers) can intercept data as it is travelling across the Internet.
Poor network policies -
Network policies are rules that users must stick to when using a network (e.g. password length and rules on email use). Poor network policies make a network more vulnerable
Penetration testing -
when companies pay professional hackers to hack into their systems and find vulnerabilities. Any vulnerabilities (security weaknesses/holes) must be reported by the hacker.
Network forensics -
monitoring a network and capturing network traffic (data packets) and alerting the administrator to any issues.
Firewall
blocks unwanted access to the network from the Internet. Firewalls inspect incoming data packets to see if they are legitimate.
Network Policies -
rules and guidelines on what users can and can’t do as well as the software to implement these rules.