Network Security Flashcards
What is malware?
Malware (Malicious Software) is installed on someone’s device without their knowledge.
Malware includes spyware, viruses, and ransomware.
What is social engineering?
A way of gaining sensitive information or illegal access to networks by influencing people, such as employees in large companies.
Social engineering exploits human psychology rather than technical vulnerabilities.
What are brute force attacks?
Attacks that use automated software to produce hundreds of username and password combinations through trial and error.
Brute force attacks can be time-consuming and are often used against weak passwords.
What is a Denial of Service (DoS) attack?
An attack that involves flooding the server with fake requests, making the website or network extremely slow and inaccessible to legitimate users.
DoS attacks can significantly disrupt service and lead to financial losses.
What is data interception?
Sometimes called a ‘man in the middle’ attack or ‘passive attack’, it involves monitoring data on the network and capturing any sensitive or personal data.
Data interception can occur without the knowledge of the parties involved in communication.
List three examples of malware.
- Spyware
- Viruses
- Ransomware
Each type of malware operates differently but generally aims to harm or exploit the user’s device.
True or False: Social engineering techniques rely on technical vulnerabilities.
False
Social engineering techniques exploit human psychology rather than technical flaws.
What is SQL Injection?
Structured Query Language is one of the main coding languages used to access databases. SQL code is typed into a website’s input box which reveals personal data.
What is Penetration Testing?
Pen Testing is when organisations employ specialists to identify possible weaknesses in the network’s security.
What is Anti-Malware?
Anti-Malware software is designed to find and stop malware from damaging a network and devices on it. Anti-virus is a type of anti-malware.
What is a Firewall?
Firewalls examine all data entering and leaving the network and block any potential threats.
What are User Access Levels?
User Access Levels control which part of the network different groups of users can access. This limits the number of people with access to important data.
What is the purpose of passwords in network security?
Passwords help prevent unauthorised users from accessing the network. Passwords should be strong and changed regularly.
What is encryption?
Encryption is when data is translated into a code which only someone with the correct key can access. Encrypted text is called ‘cipher text’.
What is physical security in the context of network security?
Physical security protects the network from intentional or unintentional damage e.g. fire, flood.