SLR1.4 Flashcards
types of attacks
malware
phishing
brute force attack
denial of service attack
data interception and theft
SQL injection
people as a weakpoint in secure systems
malware
software specifically designed to disrupt, damage or gain unauthorised access to a computer system
phishing
sending emails proposing to be from a company to convince individuals to reveal their personal information
brute force attack
a trial and error method of attempting passwords and pin numbers. automated software is used
DDOS
denial of service attack
flooding a server with useless traffic causing the server to become overloaded and unavailable
data interception and theft
stealing computer-based information with the intent of compromising or obtaining personal information
sql injection
a technique used to view or change data in a database by inserting additional code into a text input box, creating a string
what happens during malware
files are deleted, become corrupt or encrypted
crashing occurs, reboot spontaneously and slow down
internet connection becomes slow
keyboard inputs are recorded and sent to hackers to find passwords
what happen during phishing
accessing a victims account to withdraw money
open bank accounts and credit cards, cashing illegitimate cheques
gain access to high value corporate data
what happen during brute force attack
hacker attempts to access corprate systems and try to access sensitive information
what happen during DDOS
companies lose services for customers
lose revenue
productivity lowers
reputation damaged
what happen during interception
usernames and passwords are compromised
corporate data is disclosed
packet sniffers
listens to data that is being transferred between 2 points
what happen during sql injections
reveal private information
data in the database can be amended or deleted
using people as weakpoints
not installing operating system updates
not keeping antimalware up to date
not logging out of a computer
sharing passwords