1.4 Threats to Network Flashcards
1
Q
What could malware do?
A
- Files are deleted, become corrupt or are encrypted
- Computers crash, reboot spontaneously and slow down
- Internet connections become slow
- Keyboard inputs are logged and sent to hackers
2
Q
What could happen if you are a victim of phishing?
A
- Accessing a victim’s account to withdraw money, or purchase merchandise and services
- Open bank accounts and credit cards, cashing illegitimate cheques
- Gain access to high value corporate data
- Financial services can blacklist the company, resulting in damage to brand reputation
3
Q
What threat does a brute force attack pose to a network?
A
- Theft of data
- Access to corporate systems
4
Q
What threat does a denial of service attack pose to a network?
A
- Loss of access to a service for customers
- Lost revenue
- Lower productivity
- Damage to reputation
5
Q
What threat does data interception and theft pose to a network?
A
- Usernames and passwords compromised, allowing unauthorised access to systems
- Disclosure of corporate data
- Theft of data
6
Q
What threats does a SQL injection pose to a network?
A
- Contents of databases can be output, revealing private data
- Data in the database can be amended or deleted
- New rogue records can be added to the database
7
Q
What are examples of system vulnerabilities being caused by people being careless?
A
- Not installing operating system updates
- Not keeping anti-malware up to date
- Not locking doors to computer rooms
- Not logging off or locking their computer
- Leaving printouts on desks
- Writing passwords down on sticky notes attached to computers
- Sharing passwords
- Losing memory sticks/laptops
- Not applying security to wireless networks
- Not encrypting data