1.4 system security Flashcards

1
Q

Malware

A

Software written to cause loss of data, encryption of data, fraud and identity theft:
virus, worm, trojan, ransomware and spyware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Social engineering

A

Most vulnerabilities are caused by humans. Not locking computers. Using insecure passwords. Not following/poor company network policies. Not installing protection software. Not being vigilant with email/files received. Not encrypting sensitive data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Phishing

A

Sending emails purporting to be from reputable companies to induce people to reveal personal information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Brute-force attack

A

A trial and error method of attempting passwords. Automated software is used to generate a large number of guesses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Denial of service attack

A

Flooding a server with so much traffic it is unable to process legitimate requests

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Data interception and theft

A

Stealing computer-based information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

SQL injection

A

A hacking technique used to view or change data in a database by inserting SQL code instead of data into a text box on a form

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Penetration testing

A

Testing designed to check the security and vulnerabilities of a system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Anti-malware software

A

Antimalware software protects against infections caused by many types of malware, including viruses, worms, Trojan horses, rootkits, spyware, key loggers, ransomware and adware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Firewall

A

A computer application used in a network to prevent external users gaining unauthorised access to a computer system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

User access level

A

The amount of access a given user is allowed to a computer. On a network most users will have restricted access. Whereas a systems administer or network technician would be allowed much greater access with fewer restrictions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Password

A

A secret word or phrase that must be used to gain access to a computer / program / interface / system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Physical security

A

Any form of real world physical security to help protect data and systems e.g. Alarms, locks, security patrols etc

How well did you know this?
1
Not at all
2
3
4
5
Perfectly