Network Security Flashcards
Computer Surveillance
When Someone Monitors What Others do on the Internet
User Access Levels
Used to Control What Parts of a Network can be Accessed by Particular Individuals
Anti-Malware Software
To Find and Stop Malware From Damaging a Network
Passwords
Used to Prevent the Unauthorised Access of Important or Sensitive Data
SQL Injection
Structured Query Language is a Database Managing Language and can be Used to Access Information in a Database from the Input Box
Phishing
E-mails claiming to be a Legitimate Site While Sending the User to a Different Site (Normally a Malicious One)
Trojans
Malware Disguised as Legitimate Software
Worms
A Self Replicating Virus (Doesn’t Need a File)
Viruses
Infects a File and Replicates itself Inside of the File
Malware
Malicious Software
Denial-of-Service Attack (DoS)
Flooding a Network With Requests Which Slows the Network Down
Brute Force Attack
Attacking a Network Through Trial and Error to Guess the Password
Insider Attack
Someone Within an Organisation Who Steals Information
Active Attack
When Someone Attacks a Network With Malware
Passive Attack
The Interception of Data Being Transferred to be Read or Used
Scareware
Scares the User into Following Malicious Links or Paying for a Non-Existent Problem to be Fixed
Social Engineering
Influencing People into Giving Hackers Access to Information
Ransomware
Used to Lock and Encrypt Files and Demands a Large Sum of Money to Remove to Encryption
Spyware
Used to Secretly Monitor a User’s Actions
Rootkits
Used to Alter Permissions Which Gives a Hacker Administrative Access
Whitelist
Only People on the List can Access
Blacklist
Only People Not on the List Can Access
Encryption
Data Gets Translated into a Code