Network Security Flashcards
Acceptable Use Policy
a document that stipulates what users of a network may or may not do with that network
Adware
not dangerous in its own right, but may contain links to other malware, such as viruses and key loggers
Alphanumeric Characters
letters and numbers
Anti-Malware
software that detects and removes harmful software, such as viruses, from a computer
Anti-Virus
a program that can be loaded into memory when the computer is running that monitors activity on a computer system for the signs of virus infection that scans for a virus’s signature
Archive
long-term storage of files no longer in use
Backdoor
built into a computer program that allows someone to bypass any security to get to it
Back Up
where the original file is still on the computer, but there is another copy somewhere else
Full Backup
where everything is backed up
Differentiation Backup
where files are backed up between different time intervals
Incremental Backup
where only files that have been edited are backed up
Blagging
the act of convincing someone that you are someone else to make them directly give away information such as passwords
Brute Force Attack
where hackers have multiple guesses in quick succession at your password until they eventually guess it correctly
Buffer Overflow Attack
a malware attack where the attacker attempts to fill up your memory
Compression
process that reduces a file’s size for efficient storage or transmission
Cookie
a text file stored on your computer that contains details about a website that you have visited
Cyberattack
attacks on computers or networks that use various types of malware
Cyphertext
text that has been encrypted and cannot be decrypted without the decryption key
Dictionary Attack
an attack where a hacker uses a file containing every word in the dictionary to guess your password
Digital Footprint
the record that is kept of everything you have done online
Disaster Recovery Policy
a document that describes how a company would aim to recover from catastrophic damage to hardware, software or data
Distributed DoS Attack
a DoS attack involving several networks, either because several networks are attacking at once, or several networks are being attacked at once
DoS Attack
Denial of Service Attack
attempt to make your website and servers unavailable to legitimate users by swamping a system with fake requests, usually in an attempt to exhaust server resources, not to break system security, involving a single internet connection
Encryption
by encrypting data, it can only be read by someone who has the same decryption software on the other end