Section Two and a Bit: Network Security Threats Flashcards
What is a passive attack?
Where someone monitors data travelling on a network and intercepts any sensitive information they find.
They use network-monitoring hardware and software such as packet sniffers.
Passive attacks are hard to detect as the hacker is quietly listening
How do you defend against passive attacks?
Data encryption
What is an active attack?
When someone attacks a network using malware or other planned attacks.
They are more easily detected than passive attacks
How do you defend against active attacks?
A firewall
What is an insider attack?
When someone within an organisation exploits their network access to steal information.
What is a brute force attack?
- A type of active attack used to gain information by cracking passwords through trial and error.
- They use automated software to produce hundreds of likely passwords combinations
- Hackers may try lots of passwords against one username or vice versa
How do you defend against brute force attacks?
Simple measures like locking accounts after a certain number of failed attempts and using strong passwords will reduce the risk of a brute force attack
What is a Denial of Service (DoS) attack?
Where a hacker tries to stop users from accessing a part of a network or website
Most DoS attacks involve flooding the network with useless traffic, making the network extremely slow or completely inaccessible
What is malware?
Malicious Software
Installed on someone’s device without their knowledge or consent that can harm their device
What are some of the typical actions of malware?
- Deleting or modifying files
- Scareware
- Locking files
- Spyware
- Rootkits
- Opening backdoors
What is scareware?
E.g. It tells the user that their computer is infected with lots of viruses to scare them into following malicious links or paying for problems to be fixed.
What happens when a hacker locks files?
Ransomware encrypts all the files on a computer. The user receives a message demanding a large sum of money to be paid in exchange for a decryption key
What is spyware?
It secretly monitors user actions, e.g. key presses, and sends info to the hacker
What are rootkits?
Rootkits alter permissions, giving malware and hackers administrator-level access to devices
What does it mean to open backdoors?
Making holes in someone’s security which can be used for future attacks