1.4 - network security Flashcards
Malware
A term for any software which is designed with malicious intent. Malware quite literally means malicious software. There are many different types of malware which behave
in different ways.
Social Engineering
Attempting to gain access to computer systems by targeting the people using the system instead of using technical measures to attack the system itself.
Phishing
Attempting to trick someone in to revealing information such as their password, financial, or other private information by pretending to be someone else. Often in the form of an email.
Brute-force attack
Attempting to guess a code or password by trying every possible solution until the correct one is found.
Denial of Service Attack
Attempting to send more traffic or data to a computer system than it is able to handle. If successful, this results in parts of the system, or even the whole system, being unable to process the data
Data Interception
Attempting to access data whilst it is being transferred between devices, usually over a network. The victim usually has no idea that their data has been stolen.
SQL Injection
Entering SQL code into a data input field on a web site or application. If the system is not correctly coded, and uses a SQL database, the code could be run directly on the database.
Penetration Testing
An authorised hacking attempt where a person or company attempts to hack into a system or network and then reports their finding to the system’s owner. This allows any flaws to be fixed.
Anti-Malware Software
Software which attempts to detect, prevent and remove malware on a computer system. Anti-Virus software is a common example of anti-
malware software.
Firewall
A network security device which checks traffic passing through it against a set of rules, only traffic which meets the rules is allowed through.
User Access Level
Controlling which aspects of a system or network users can access. Users are allowed access only to the parts of the system the need, preventing them from accidentally or deliberately damaging data/the system
Password
A secret word or phrase, usually provided alongside a username, to control access to a system or network.
Encryption
The process of converting data so that it cannot be easily read or understood without first being decrypted.
Physical Security
Securing the physical components of a system or network. This may be cameras or locking a door to a computer room