1.4 - Network security Flashcards
What are the forms of attack?
- Active
- Passive
- External
- Internal
What is an active attack?
Where the hacker attempts to modify or delete data
or
to prevent a network from operating correctly
What is a passive attack?
Where the hacker monitors a network in order to gain information
What is a passive attack also known as?
Eavesdropping
What is malware?
Malicious software that is designed to hack a system
What is an Internal attack?
Where someone within an organisation attempts to hack its network
What is an External attack?
Where someone outside of an organisation attempts to hack its network
What is Social engineering?
Tricking others into revealing their personal data by posing as a trusted source
Give some examples of some types of Social engineering:
- Phishing
- Shoulder surfing
- Blagging
What is phishing?
An attempt to gain personal information about someone by way of deception by email
What is a Brute force attack?
Automated or manual attempts to gain unauthorized access to secure areas by trying all the possible password or key combinations
How can a Brute force attack be sped up?
If multiple computer systems are used
What is a DoS attack?
Severs & devices are flooded w/too many requests/ packets, causing them to crash or become unstable
What does DoS stand for?
Denial of service
What is a DDoS?
A coordinated attack using a botnet of infected systems to overload a server with requests
What does DDoS stand for?
Distributed Denial of Service
What is a botnet?
A large group of devices controlled and use maliciously by an attacker
What is Data interception & theft?
Data may be intercepted during transmission, but physical theft can occur where storage devices/ data files are left insecurely
What are SQL injections?
Pieces of malicious SQL is entered into a website’s input box which then reveal sensitive information
When is a SQL used?
To search databases/ access information
What does SQL stand for?
Structured Query Language
Describe what happens when data is entered into a webform?
The website will contact the database server to find the account details & display them
Describe what happens when a hacker enters a malicious SQL into the password field:
It will modify the SQL that is executed
—> They can gain administrator privileges or view + edit contents of the database
What is Interception?
When data packets on a network are intercepted by a third party and copied to a different location than the intended destination
Name the software that is used in interception
Packet sniffers
What is Blagging?
Dishonestly persuading someone to divulge personal information by deception
Give an example of Blagging
Someone makes up a story to gain a person’s interest and uses this to encourage them to give away information about themselves, or even send money