Key terminology 1.6 Flashcards
Malware
Malicious software intended to cause loss of data or damage to data.
Phishing
Someone sending an email pretending to be someone the’re not to get your personal details.
Pharming
Using a fake website to get y.our personal information.
Brute force attacks
A repetitious trial and error method of guessing passwords
Denial of service attacks
Flooding a server with lots of access requests to cause the server to crash.
Data interception
Someone stealing data during transmission.
SQL injection
A method of changing database code by inserting unwanted SQL commands.
Network policies
Rules used to control user activities to try an prevent any violations to security.
Penetration testing
Testing the security of a system or network by attempting to hack into it.
Network forensics
The monitoring of network traffic for information gathering and intrusion detection.
Anti-Malware software
A protection against infections caused by malware.
Firewalls
A computer application used to prevent unauthorized access to a network or computer system.
User access levels
These allow for different users to be allowed access to different things to better the security of a network or computer system.
Password
A secret word or phrase to prevent unauthorized access to a computer or system.