Network Security Flashcards
What is Malware
Any type of harmful program that seeks to damage or gain unauthorised access to the computer system
Describe 3 characteristics of a virus
A virus can replicate itself, only activated when opened by a human and can change data/corrupt a system so then it no longer works
Describe 3 characteristics of a worm
A worm can replicate itself by finding weaknesses, does not need to be opened and can spread very quickly
What is trojan
A harmful program that looks legitimate to trick users into installing it so then attackers have access to the system
Describe how spyware and keyloggers work
Both programs records a users activity (spyware is software, keylogger is input) to record passwords, usernames and credit card info.
Describe how Ransomware works and why it is difficult to trace attackers who use it
It locks files on a system using encryption so then the user can no longer access them. They usually use bitcoin which makes it harder to trace them.
What is SQL injection and how do attackers use it
SQL (structured query language) is a programming language for manipulating data in data bases and it can be used view and edit the contents of a database
What is a DOS attack and what is it’s impact
A DOS (Denial of service) attack is when a computer repeatedly sends requests to a server to overload it and slow down the system temporarily.
How is DDOS attack different to DOS
Distributed denial of access is different because it uses a botnet of infected systems to overload a system. Botnot is a large group of devices controlled and used maliciously.
Describe a brute-force attack
Attempting every possible combination in order from start to finish to gain access to a system
Describe social engineering
Posing as a trusted source to gain personal information on someone
Describe interception
Data packets on a network are intercepted and copied to a different location that the intended one
Describe the purpose of penetration tests
To review a system’s security to find any risks or weaknesses and fix them
Describe internal tests
How much damage can possibly be done by somebody within the company with a registered account
Describe external testing
For white hat hackers to try and infiltrate the system from outside the company