Network Security Flashcards
Acceptable Use Policy
a document that stipulates what users of a network may or may not do with that network
Adware
not dangerous in its own right, but may contain links to other malware, such as viruses and key loggers
Alphanumeric Characters
letters and numbers
Anti-Malware
software that detects and removes harmful software, such as viruses, from a computer
Anti-Virus
a program that can be loaded into memory when the computer is running that monitors activity on a computer system for the signs of virus infection that scans for a virus’s signature
Archive
long-term storage of files no longer in use
Backdoor
built into a computer program that allows someone to bypass any security to get to it
Back Up
where the original file is still on the computer, but there is another copy somewhere else
Full Backup
where everything is backed up
Differentiation Backup
where files are backed up between different time intervals
Incremental Backup
where only files that have been edited are backed up
Blagging
the act of convincing someone that you are someone else to make them directly give away information such as passwords
Brute Force Attack
where hackers have multiple guesses in quick succession at your password until they eventually guess it correctly
Buffer Overflow Attack
a malware attack where the attacker attempts to fill up your memory
Compression
process that reduces a file’s size for efficient storage or transmission
Cookie
a text file stored on your computer that contains details about a website that you have visited
Cyberattack
attacks on computers or networks that use various types of malware
Cyphertext
text that has been encrypted and cannot be decrypted without the decryption key
Dictionary Attack
an attack where a hacker uses a file containing every word in the dictionary to guess your password
Digital Footprint
the record that is kept of everything you have done online
Disaster Recovery Policy
a document that describes how a company would aim to recover from catastrophic damage to hardware, software or data
Distributed DoS Attack
a DoS attack involving several networks, either because several networks are attacking at once, or several networks are being attacked at once
DoS Attack
Denial of Service Attack
attempt to make your website and servers unavailable to legitimate users by swamping a system with fake requests, usually in an attempt to exhaust server resources, not to break system security, involving a single internet connection
Encryption
by encrypting data, it can only be read by someone who has the same decryption software on the other end
Firewall
a security system that controls incoming and outgoing network traffic, that analyses packets of data to determine whether they should be allowed through or not, its function is to monitor where data has come from and where it is going and to determine if this communication is allowed by checking a list of pre-determined rules, not to stop viruses
Footprinting
where an attacker builds up a profile about someone to make it easier to guess their passwords
Fraud
a crime in which you purposefully deceive someone for monetary gain
Guess Attack
where a hacker makes an educated guess at your password
Hashing
performing an algorithm on a password which allows entered passwords to be checked, without allowing the actual password to be viewed