1.4 Network Security Flashcards

1
Q

Different forms of attack

A

Malware
Phishing
Brute force
Denial of service
Data interception and theft
SQL injection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Malware

A

Software which is specifically designed to disrupt, damage or gain and authorise access to a computer
e.g. Forest, worms, spyware etc

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Phishing

A

The action of sending fake emails or are things to pretend to be a company individuals and get the personal information from it.
E.g. password, credit card number

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Brute force attack

A

A trial and error to attempting password and PIN number. Automatic software is used to generate large number of guesses.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Denial of service (DoS) attack

A

Flooding a server with useless traffic causing the server to become overloaded and unavailable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Data interception and theft

A

The unauthorised act of stealing computer-based information from an unknown victim with the intent of compromising privacy or obtain confidential information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

SQL injection

A

A technique used to view or change data in a database by inserting additional code into a text input box, creating a different search strain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Effect of malware

A

Files are deleted, they become corrupt or are encrypted
Computer crash, reboot spontaneously and slow down
Internet connections becomes slow
Keyboard input logged and sent to hackers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Effect of phishing

A

Accessing victims account to withdraw money, or purchase merchandise and services
Open bank account and credit cards , cashing illegitimate cheques
Gain access to high corporate data
Financial services can blacklist the company, resulting in damage to brand reputation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Effect of brute force attack

A

Theft of data
Access to cooperate systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Effect of danial of service attack

A

Loss of access to service for customer
Loss revenue
Lower productivity
Damage to reputation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Effect of data interception and theft

A

Usernames and password compromised, allowing an authorised access to system
Disclosure off cooperate data
Theft of data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

SQL injection

A

Contents of database can be output, revealing private data
Data in the database can be amended or delete it
New rogue record can be added to the database

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

People as a weak point (system vulnerability caused by human)

A

Not installing operating system update
Not keeping anti-malware up-to-date
Locking doors to computer rooms
Leaving print out on desk
Writing password down on sticky notes attached to computers
Sharing passwords
Losing memory sticks /laptop
Not applying security to wireless network
Not encrypting data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly