Glossary Terms - Determine & Action Network Problems Flashcards
Virus
Inserts and copies themselves into programs. Can corrupt or destroy data.
Worms
Like viruses but spread by themselves. They are capable of overloading networks since they spread quickly.
Trojans
Designed as desirable software and can perform the tasks of a virus.
Spyware
Collects data about the activities of the computer and sends it back to the attacker.
Adware
Displays unwanted advertisements to generate income for the attacker.
Phishing
Where a website, email or software looks trustworthy but isn’t. Personal data such as credentials are collected.
Social Engineering
Where people are exploited as weak-points by manipulating them, and influencing them to do something.
This is done by using information they already know about them to guess their password.
Brute-Force Attacks
All possible combinations are systematically tried in the aim of getting the correct username & password.
Data Interception
Data is captured when travelling through radio waves through packet sniffers or a website and credentials can be compromised.
DoS
Floods a network with useless requests and causes the network to be deliberately overloaded and becomes unresponsive/crashes.
SQL Injection
Where malicious SQL commands are inserted into the fields of websites to get an output.
Email Security
The way in which the contents of emails are kept safe as they are stored and sent over networks.
Intrusion Prevention Systems
Software and systems which alert the user to any packets of data that aren’t a legitimate part of the network traffic to warn them of possible threats to data and information.
Network Segmentation
How a network is broken up into multiple parts or segments. This makes use of a decentralised/blended type of management, where all workstations on the network have equal access to data. However, the network admins have the most control.
DMZ
Demilitarised Zone.
A type of server which improves the security and performance to a network.