1.4 New Flashcards

You may prefer our related Brainscape-certified flashcards:
1
Q

Malware

A

term for any software that has been created with malicious intent to cause harm to a computer system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

examples of issues caused by malware

A

-files being deleted, corrupted or encrypted
-internet connection becoming slow or unusable
-computer crashing or shutting down

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

what are the types of malware

A

-virus
-worms
-trojan
-spyware
-ransomware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

virus

A

a program which can replicate itself on a user’s computer. It contains code that will cause unwanted and unexpected events to occur

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

examples of what a virus can do

A

-corrupt files
-delete data
-prevent applications from running correctly

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

worms

A

similar to viruses except they will spread to other drives and computers on the network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

how can worms infect other computers

A

-infected websites
-instant message services
-email
-network connection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

trojan

A

disguise themselves as legitimate software but contain malicious code in the background

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

spyware

A

software which will allow a person to spy on the user’s activities on their devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

examples of what spyware can do

A

-record your screen
-log your keystrokes to gain access to passwords and more

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

how does one download spyware

A

embedded into other software like games or programs that have been downloaded from illegitimate sources

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

ransomware

A

-malware that locks your computer or device and encrypts your documents and other important files
-a demand in made for money to receive the password that will allow the user to the files
-no guarantee paying ransom will result in user getting data back

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

social engineering

A

exploiting weaknesses in a computer system by targeting the people that use or have access to them

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

examples of social engineering

A

-fraudulent phone calls
-phishing
-pretexting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

phishing

A

-sending fraudulent emails to a large number of email addresses claiming to be from a reputable company to try gain access to details, often by coaxing the user to click on a login button

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

examples of human errors in computer systems

A

-not locking doors to computer/server rooms
-not logging their device when they are not using it
-sharing passwords
-not encrypting data
-not keeping operating systems or anti-malware software up to date

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

brute force attack

A

attacker repeatedly tries multiple combinations of a user’s password to try and gain unauthorised access to their accounts or devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

dictionary attack

A

trying popular words or phrases for passwords to guess the password quickly

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

DoS attack

A

-occurs when an attacker repeatedly sends requests to a server to flood the server with traffic, causing it to overload the system
-server slows down until it becomes unusable

20
Q

larger scale of DoS attack

A

-Distributed Denial of Service
-multiple devices in a coordinated attack

21
Q

botnet

A

numerous internet-connected devices that have been infected with malware and can be controlled remotely by an attacker

22
Q

purpose of a DoS attack

A

-prevents customers from accessing or using a service
-results in companies losing money
-damage to a company’s reputation

23
Q

data interception and theft

A

-when thieves compromise usernames and passwords and other sensitive data
-using packet sniffer, which can collect data that is being transferred on a network
-gain unauthorised access to websites, companies and more

24
Q

SQL

A

language to create, access and manipulate a database

25
Q

SQL injection

A

-entering an SQL command into a web text field to manipulate the query
-to insert, modify, delete or gain unauthorised access to the database

26
Q

penetration testing

A

-method or preventing vulnerabilities where a company employs people to try and hack their network and databases
-allows hackers to point out the parts of the system that are vulnerable
-company uses this information to fix the issues that are found

27
Q

what does penetration testing protect against

A

SQL injection

28
Q

anti-malware

A

term to describe a combination of different software to prevent computers from being susceptible to viruses and other malicious software

29
Q

types of anti-malware

A

-anti-virus
-anti-spam
-anti-spyware

30
Q

how does anti-malware work

A

-scans through email attachment, websites and downloaded files to search for issues
-has a known list of malware signatures to block immediately if they try to access
-perform checks for updates to ensure database of known issues are up to date

31
Q

what does anti-malware protect against

A

any form of malicious software

32
Q

firewall

A

barrier between a network and the internet

33
Q

what does a firewall do

A

prevents unwanted traffic from entering a network by filtering requests to ensure they are legitimate

34
Q

hardware firewall

A

-protect the whole network and prevent unauthorised traffic

34
Q

software firewall

A

protect the individual devices on the network. monitoring the data going to and from each computer

35
Q

what does a firewall protect against

A

-hackers
-malware
-unauthorised access to a network
-DoS/DDoS attacks

36
Q

user access levels

A

-ensure users of a network have designated roles on a network

37
Q

password

A

digital lock to prevent unauthorised access to an account
-stores as an encrypted text entry in a database, ensuring even with unauthorised access to a database, a hacker would not be able to gain access to individual passwords of users

38
Q

what forms of attacks does user access levels and passwords prevent

A

-data interception and theft
-physical security issues
-SQL injections

39
Q

encyrption

A

-method of converting plain text into ciphered text to be stored

40
Q

what forms of attacks does encryption prevent

A

all forms of attack on a network
-does not prevent attack from occurring but stops attacker from gaining access to the information

41
Q

physical security

A

method of physically preventing access to any pat of a network

42
Q

examples of physical security measures

A

-locked doors: prevents access to server rooms and switches
-biometrics
-surveillance cameras

43
Q

what form of attacks to physical security prevent

A

-data interception and theft
-social engineering

44
Q

chart

A

https://www.savemyexams.com/gcse/computer-science/ocr/22/revision-notes/4-network-security/identifying-and-preventing-threats-to-computer-systems-and-networks/methods-of-preventing-a-network-attack/