1.4 NETWORK SECURITY AND SOFTWARE Flashcards
What is a network attack?
Hint words: gain, access, steal, modify, delete
An attempt to gain access to steal, modify, or delete data from a network.
What is an active attack?
Hint: attempts, modify, delete, data, correctly
Where a hacker attempts to modify or delete data, or to prevent a network from operating correctly.
What is an example of an active attack?
Denial of service.
What is Eavesdropping (passive) attack?
Hint: monitors
Where the hacker monitors a network in order to gain information.
What is an example of passive/eavesdropping attack?
Wiretapping. Where communications are monitored.
What is an external attack?
Hint: outside, organisation, its
Where someone from the outside of an organisation attempts to hack its network
What is an internal attack?
Hint: within, hack
Where someone from within an organisation attempts to hack a network.
What is a malware?
Hint words: malicious, designed, system
A malicious software that is designed to hack a system
What is a virus?
Hint: hidden, replicate, damage, deleting, modifying, data.
Programs hidden within other files. They replicate themselves and become a part of other programs. They cause damage by deleting or modifying data.
What are worms?
Hint words: aren’t hidden, spread, emails
Programs like viruses except they aren’t hidden in programs. They are instead spread through emails.
What are trojans?
Hint: pretend, legitimate , deceive, installing
Programs which pretend to be legitimate but in reality are malware. Cannot spread by themselves. Deceive the user into installing the program.
What is spyware?
Hint words: programs, monitor, activities, send info back
Programs that monitor user activities. Such as websites visited, usernames, passwords and send info back to hacker.
What is a malware threat?
Hint words: attempt, user, payment, hacker
Programs that attempt the user into making payment for the hacker
What is phishing?
Emails that try to trick the users into giving away personal details.
What is brute force?
Where a program is used to find a password by trying all possible combinations and passwords until the correct one is obtained.