1.4 Network Security Flashcards
What is an active attack
When someone attacks a network with malware
What is a passive attack
The monitoring and interception of data
What is a brute force attack
Passwords are cracked through trial and error
Using software to try every combination
How to defend a brute force attack
Lock after a certain amount of guesses
What is a DOS attack
Denial of Service
The users cannot access a certain part of the network by flooding the network with traffic
Malware
Malicious software that exploits a computer
How can malware enter a computer
Virus
Worms
Trojan
What are viruses
Malware that binds to a certain file and goes onto computer when opened
What are worms
Self-replicating malware
What are Trojans
Malware disguised as legitimate software
What is usually the weak point in secure systems and give an example how
People, shoulder surfing
What is social engineering
Gaining access to a network or information by manipulating people
What is phishing
When people are sent emails or messages claiming to be legitamate and it’s aim is to steal data
Apart from phishing give an example of social engineering
Scam calls
What is an insider attack
Someone who has access to the network exploits it to steal information