1.4 Network Security Flashcards
What are the types of network attacks?
- Data interception and theft
- Brute-force
- Denial of Service (DoS)
- SQL injection
- Malware
- Phishing -> social engineering
Data interception and theft
Sensitive information travelling on a network is intercepted using monitoring hardware and software like packet sniffers
Brute-force
Automated software is used to try millions of potential passwords until one works
Denial of Service (DoS)
Hacker prevents users from accessing a network or website by flooding it with useless traffic/requests
SQL injection
SQL code typed into input boxes on a website -> can gain access to databases behind the website if it doesn’t have strong input validation
Malware
Software designed to damage or disrupt a device or network
Types of malware
- Spyware
- Scareware
- Ransomware
- Rootkit
- Viruses
- Worms
- Trojans
Spyware
Monitors user actions and sends info to the hacker
Scareware
Tricks user into paying to fix fake problems
Ransomware
Encrypts files. User pays for decryption key
Rootkit
Gives hackers admin access to the system
Viruses
Attached to other files. Only run or replicated when the file is opened
Trojans
Malware disguised as legitimate software. Do not replicate themselves.
Social Engineering
Gaining access to networks or sensitive information by using people as a system’s weak point
Phishing
Hackers impersonate well-known businesses sending emails or messages to you. They contain links to fake websites that ask users to update their personal information, which the criminal steals.