Networks security Flashcards
Social engineering-What is phishing?
When criminals send emails or texts to people claiming to be the real business. This could send you to a website so you can put in personal info
Social engineering- What is pharming?
When a user is directed to a fake version of a website that looks like the real thing, with the aim that the user won’t notice
Social Engineering-What is blagging?
When someone makes up a story or pretends to be someone they’re not to persuade the victim to share personal information or do things they wouldn’t normally do.
Social Engineering- What is shouldering?
Watching or observing a person’s activity (sometimes over their shoulder). Examples of this are spying someone’s PIN number at a cash machine.
Social Engineering- What are some warning signs of pharming?
In the website you could notice the following-Pop ups, image quality, text quality, and spelling mistakes.
Malware- What is worms?
Worms are like viruses but they self replicate without any user help, meaning they can spread quickly.
They exploit weaknesses in network security
Malware-What are trojans?
Malware disguised as legitimate software. Unlike viruses and worms, trojans don’t replicate themselves, users install them not realising they have a hidden purpose.
Malware- What are viruses/ what do viruses do?
Viruses attach themselves (by copying themselves) to certain files e.g. exe files and autorun scripts.
Malware- What can viruses and worms do to the computer?
They can make the whole computer unusable.
Malware- What is spyware?
A software that observes your activities. A key logger tracks what you are typing, websites you go to, and they can get sensitive information e.g bank details, passwords.
Malware- How do viruses spread and how do users activate them?
Users spread them by copying infected files and activate them by opening infected files.
Wired and wireless- Benefits of wireless
Networks can be wired or wireless
Benefits of wireless networks:
•Cheap to set up
• Up to 50 metres
• Can connect loads of devices without needing extra hardware
• Doesn’t take up more space and is less messy because there are no extra wires
Wired and wireless- Disadvantages of wireless
- Connection is not as stable
- More vulnerable to hacking
- Slower than wired networks
- Up to 50 megabits per second
Why we need and importance of network security
Organisations must keep networks secure from hackers in order to protect sensitive information and comply with data protection laws