1.4 Threats to Network Flashcards

1
Q

What could malware do?

A
  • Files are deleted, become corrupt or are encrypted
  • Computers crash, reboot spontaneously and slow down
  • Internet connections become slow
  • Keyboard inputs are logged and sent to hackers
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What could happen if you are a victim of phishing?

A
  • Accessing a victim’s account to withdraw money, or purchase merchandise and services
  • Open bank accounts and credit cards, cashing illegitimate cheques
  • Gain access to high value corporate data
  • Financial services can blacklist the company, resulting in damage to brand reputation
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What threat does a brute force attack pose to a network?

A
  • Theft of data
  • Access to corporate systems
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What threat does a denial of service attack pose to a network?

A
  • Loss of access to a service for customers
  • Lost revenue
  • Lower productivity
  • Damage to reputation
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What threat does data interception and theft pose to a network?

A
  • Usernames and passwords compromised, allowing unauthorised access to systems
  • Disclosure of corporate data
  • Theft of data
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What threats does a SQL injection pose to a network?

A
  • Contents of databases can be output, revealing private data
  • Data in the database can be amended or deleted
  • New rogue records can be added to the database
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are examples of system vulnerabilities being caused by people being careless?

A
  • Not installing operating system updates
  • Not keeping anti-malware up to date
  • Not locking doors to computer rooms
  • Not logging off or locking their computer
  • Leaving printouts on desks
  • Writing passwords down on sticky notes attached to computers
  • Sharing passwords
  • Losing memory sticks/laptops
  • Not applying security to wireless networks
  • Not encrypting data
How well did you know this?
1
Not at all
2
3
4
5
Perfectly