1.4.Network Security Flashcards
Malware
Malicious software that causes damage when it runs (e.g. editing or deleting files).
Phishing
Tricking users into giving personal info via fake emails or messages.
Pharming
Redirects you to a fake website to collect personal data.
Social Engineering
Manipulating people into giving personal or sensitive data.
Data interception and theft
Data sent to another device is intercepted by an unauthorised user.
SQL Injection
Inserting malicious SQL into databases to access or steal data.
Poor Network Policy
Lack of security rules lets unauthorised users access data.
Weak Passwords
Passwords that are easy to guess or lack complexity.
Out of date software
Software that hasn’t been updated and is vulnerable to threats.
Ransomware
Blocks access to files until a ransom is paid.
Passive Attack
Monitoring network traffic to steal data without altering it.
Active Attack
Attacking a network with malware or planned harm.
Insider Attack
An insider misuses their access to steal or expose data.
Brute Force Attack
Using software to try many password combinations.
Denial of Service (DoS)
Flooding a network with traffic to stop it working.
Penetration Testing
Testing network security by simulating attacks.
Physical Security
Using locks, keys, and ID cards to protect systems.
Network Policies
Rules to reduce chances of employee data leaks.
Anti-malware Software
Detects and removes malware.
Firewalls
Monitor traffic to block unauthorised access.
User Access Levels
Different access rights to protect sensitive info.
Passwords
Used to verify identity and prevent unauthorised access.
Encryption
Scrambles data to prevent unauthorised users from reading it.