1.4.1 Flashcards
what are the forms of attack on a computer?
-passive
-active
-insider
-brute force
-denial of service
-SQL injection
-phishing
-social engineering
describe passive
network traffic is monitored and then data is intercepted
describe active
someone deliberately attacks a network with malware
describe insider
someone with network access abuses this to steal information
describe brute force
trial and error until a password is cracked
describe denial of service
the network is flooded with useless data so it is slow to use
describe SQL injection
SQL commands are typed into the input boxes on a website to access data or alter the database
describe phishing
emails with links that trick people into entering their personal information
describe social engineering
when a person manipulates someone else into handing over sensitive information
malware
malicious software intended to cause harm
what are the types of malware?
-virus
-worm
-trojan
virus
attach themselves to files and copy themselves when the user copies or opens a file
worm
copy themselves without the user doing anything
trojan
malicious software pretending to be a legitimate program