revision Flashcards
What is malware also known as
malicious software
How do viruses work
attaches itself to files or programs on a computer and causes damage
How do Trojan horses work
misleads user of its intent to get into their computer
What does DDOS stand for
distributed denial of service
What is the purpose of penetration testing
to check for vulnerabilities in a controlled environment so they can be fixed before they are maliciously exploited
What are user access levels and why are they good
allow an administrator to set up a hierarchy of users and lower level users cannot access sensitive information
What is a password
typically a string of characters used to gain access to a system,
Bio metrics can be used in addition to character passwords, examples include voice and face recognition, why might they be used
they are almost impossible to forge, you always have them with you, reduces password rest costs
What type of method is a brute force attack
trial and error
What makes a strong password
12 or more characters and a mixture of capital and lower case letters, numbers and symbols
Using the key of 3 what does abzovmqba mean
decrypted
What does social engineering rely on
human interaction
What is the most common way phishing attacks are sent
emails
what do users need to decipher encrypted messages
key
How does SQL injection work
malicious code is entered into a query into a SQL database to gain data and information