1.4 network security Flashcards
What is malware
Malicious software designed to hack a system
What is a virus
Type of malware. Programs embedded in other files. Cause damage by deleting or modifying data
What is a worm
Type of malware. Similar to viruses but not hidden in other data. Often spread through emails
What is a Trojan horse
Type of malware. Pretends to be legitimate but is malware. Cannot spread by themselves so deceive users into installing them
What is spyware
Type of malware. Programs that monitor user activities (such as websites visited, usernames and passwords used) and send the information back to a hacker.
What is ransomware
Type of malware. Attempt to blackmail a user into making a payment to a hacker. Some types of ransomware do little but try to scare users into paying, while others go further - they encrypt documents and will not decrypt them until a ransom is paid.
What is phishing
Emails that try to trick users into giving away personal details. The phishing email pretends to be a genuine message and tries to deceive the user into following a link to a website that looks like the real company.
What is brute force
Where a program is used to find a password by trying all possible combinations of characters until the correct one is obtained.
What is denial of service
Where a computer (or many computers) is used to prevent a server from performing its tasks. This is done by bombarding the server over and over again with requests. Eventually the server is tied up trying to handle all the DOS requests, making it very difficult for it to respond to legitimate requests.
What is data interception
Also known as man-in-the-middle attacks. Where data is intercepted during transmission. This is done using software called a packet sniffer, which examines data packets as they are sent around a network, or across the internet. The information gathered is sent back to a hacker.
What is an SQL
Where SQL code is entered as a data input. Many databases use SQL code to interrogate the data and maintain the structure. SQL code can be inputted as data, which can cause errors or unintended operations.
What is penetration testing
Testing networks for weaknesses to fix them
What is a firewall
Application that prevents unauthorised data to and from the network using a firewall policy
What is encryption
Files that have been altered using a secret code that are unreadable to unauthorised users
What is anti malware software
Software that detects, removes and prevents malware