SLR1.4 Flashcards

1
Q

types of attacks

A

malware
phishing
brute force attack
denial of service attack
data interception and theft
SQL injection
people as a weakpoint in secure systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

malware

A

software specifically designed to disrupt, damage or gain unauthorised access to a computer system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

phishing

A

sending emails proposing to be from a company to convince individuals to reveal their personal information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

brute force attack

A

a trial and error method of attempting passwords and pin numbers. automated software is used

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

DDOS

A

denial of service attack
flooding a server with useless traffic causing the server to become overloaded and unavailable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

data interception and theft

A

stealing computer-based information with the intent of compromising or obtaining personal information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

sql injection

A

a technique used to view or change data in a database by inserting additional code into a text input box, creating a string

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

what happens during malware

A

files are deleted, become corrupt or encrypted

crashing occurs, reboot spontaneously and slow down

internet connection becomes slow

keyboard inputs are recorded and sent to hackers to find passwords

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

what happen during phishing

A

accessing a victims account to withdraw money

open bank accounts and credit cards, cashing illegitimate cheques

gain access to high value corporate data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

what happen during brute force attack

A

hacker attempts to access corprate systems and try to access sensitive information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

what happen during DDOS

A

companies lose services for customers

lose revenue

productivity lowers

reputation damaged

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

what happen during interception

A

usernames and passwords are compromised

corporate data is disclosed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

packet sniffers

A

listens to data that is being transferred between 2 points

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

what happen during sql injections

A

reveal private information

data in the database can be amended or deleted

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

using people as weakpoints

A

not installing operating system updates

not keeping antimalware up to date

not logging out of a computer

sharing passwords

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

security softwares

A

firewalls
spam filters
anti virus
anti spyware
anti spam
staff training
backing up files regularly

17
Q

preventing phishing

A

have strong security software
staff training-awareness of spotting fake emails
staff training-disabling browser pop ups
staff training-not revealing personal information

18
Q

preventing brute force attacks

A

using progressive delays
using effective passwords
network lockout policy-locks out after 3 tries

19
Q

preventing DDOS

A

having strong firewalls
packet filtering on routers
web servers that spot DDOSs

20
Q

preventing data interception and theft

A

encryption
using virtual networks
use of passwords
investigating network vulnerabilities

21
Q

preventing sql injections

A

validation on input boxes
using parameters queries
setting database permissions
penetration testing

22
Q

penetration testing

A

employing people to hack your programs

23
Q

common errors that staff can make to endanger the security of a network

A

problem - bringing unauthorised files
solution - not allowing external devices being used on the network

problem - allowing physical access to a network
solution - locking doors

problem - Sending/sharing sensitive data with
third parties
solution - blocking/restricting access to USB ports/emails