Network Security Flashcards
Computer Surveillance
When Someone Monitors What Others do on the Internet
User Access Levels
Used to Control What Parts of a Network can be Accessed by Particular Individuals
Anti-Malware Software
To Find and Stop Malware From Damaging a Network
Passwords
Used to Prevent the Unauthorised Access of Important or Sensitive Data
SQL Injection
Structured Query Language is a Database Managing Language and can be Used to Access Information in a Database from the Input Box
Phishing
E-mails claiming to be a Legitimate Site While Sending the User to a Different Site (Normally a Malicious One)
Trojans
Malware Disguised as Legitimate Software
Worms
A Self Replicating Virus (Doesn’t Need a File)
Viruses
Infects a File and Replicates itself Inside of the File
Malware
Malicious Software
Denial-of-Service Attack (DoS)
Flooding a Network With Requests Which Slows the Network Down
Brute Force Attack
Attacking a Network Through Trial and Error to Guess the Password
Insider Attack
Someone Within an Organisation Who Steals Information
Active Attack
When Someone Attacks a Network With Malware
Passive Attack
The Interception of Data Being Transferred to be Read or Used