1.4 Network Security Flashcards
Different forms of network attack
Passive attack
Active attack
Insider attack
Brute force attack
Denial of Service attack (DoS)
Malware full form
Malicious Software
Malware
installed on a person’s device without their consent
Ways in which malware can access your computer
Viruses
Worms
Trojans
How viruses enter the computer
Attach to files. Activated when the user opens the file
What do viruses do?
Deletes/corrupts data
How Worms enter the computer
Like viruses, but self – replicate (without users interaction)
What do worms do?
Slows down the computer/creates backdoors
How trojans enter the computer
Looks like legitimate software. Users install them thinking that they are legitimate software
What do trojans do?
Slows down the computer/creates backdoors
Typical Actions of Malware
Ransomware
Scareware
Spyware
Ransomware
Encrypts users files and asks for money in exchange for the decryption key
Scareware
Tells the user that their computer is infected with viruses and provides malicious links to ‘solve’ them
Spyware
Secretly monitors user actions
Social Engineering
influencing/manipulating people to give sensitive information