1.4 Network Security Flashcards
What are the 4 types of malware
- Virus
- Ransom-ware
- Trojan horse
- worms
What does malware mean
Malicious software
What are the 4 types of attacks
- Malware
- data interception ( man in the middle )
- social engineering
- spyware
What is social engineering
Manipulating people into giving up personal information
What is spyware
Spying on people with their own computer (like impero)
What is phishing
Fake e- mails to get you to give up personal info / passwords
What is shoulder surfing
Looking over peoples shoulders while they type their passwords
What is a DDoS / DoS attack
Overloads a server with traffic causing it to slow down or crash
What is the difference between DDoS and a DoS attack
A DoS attack is from 1 computer whereas a DDoS uses a bot net
What is a bot net
Series of injected computers that send traffic to a website
How does a virus work
Attaches to a host file, spreading damaging and stealing into from other files
How does a Trojan horse work
The file disguises itself as something desirable although when it is opened it damages and steals files
How do worms work
File duplicates and takes up space and slows down a server
How does ransom ware work
Holds files hostage until ransom is payed
How does an SQL injection work
SQL code is typed into a search - bar to access a database
How does key logging work
Tracks key presses on a keyboard
What is anti - malware software
Software that identifies and sends malware and sends it to an anti-malware company who adds signature to the file and adds the signature to the black-list
How does a firewall work?
A set of rules that determine what can access and enter your computer / router
What is physical protection
When servers and computers use protected by physical methods( e.g. Security cameras )
How does penetration testing work
A white hat hacker tests network security to test for weak points and reports problems to hirer
How does encryption work?
Messages/ files are scrambled so they can’t be read by anyone without A decryption key
How do user access level work?
Allows people with different permissions to access different setting, files, data -basses
How does password secrets work
Including symbols, punctuation, capital letters, minimum length - more difficult to guess
What are the 3 types of hackers
- White hat(private,legal)
- grey hat(moral, illegal)
- black hat (immoral, illegal)