1.4 Network Security Flashcards
Different forms of attack
Malware
Phishing
Brute force
Denial of service
Data interception and theft
SQL injection
Malware
Software which is specifically designed to disrupt, damage or gain and authorise access to a computer
e.g. Forest, worms, spyware etc
Phishing
The action of sending fake emails or are things to pretend to be a company individuals and get the personal information from it.
E.g. password, credit card number
Brute force attack
A trial and error to attempting password and PIN number. Automatic software is used to generate large number of guesses.
Denial of service (DoS) attack
Flooding a server with useless traffic causing the server to become overloaded and unavailable
Data interception and theft
The unauthorised act of stealing computer-based information from an unknown victim with the intent of compromising privacy or obtain confidential information
SQL injection
A technique used to view or change data in a database by inserting additional code into a text input box, creating a different search strain
Effect of malware
Files are deleted, they become corrupt or are encrypted
Computer crash, reboot spontaneously and slow down
Internet connections becomes slow
Keyboard input logged and sent to hackers
Effect of phishing
Accessing victims account to withdraw money, or purchase merchandise and services
Open bank account and credit cards , cashing illegitimate cheques
Gain access to high corporate data
Financial services can blacklist the company, resulting in damage to brand reputation
Effect of brute force attack
Theft of data
Access to cooperate systems
Effect of danial of service attack
Loss of access to service for customer
Loss revenue
Lower productivity
Damage to reputation
Effect of data interception and theft
Usernames and password compromised, allowing an authorised access to system
Disclosure off cooperate data
Theft of data
SQL injection
Contents of database can be output, revealing private data
Data in the database can be amended or delete it
New rogue record can be added to the database
People as a weak point (system vulnerability caused by human)
Not installing operating system update
Not keeping anti-malware up-to-date
Locking doors to computer rooms
Leaving print out on desk
Writing password down on sticky notes attached to computers
Sharing passwords
Losing memory sticks /laptop
Not applying security to wireless network
Not encrypting data