Systems Security Finished Flashcards
what is the disadvantage of a network working on the principle of communication and sharing
data has the ability to be accessed by unauthorised people
what are the four types of network attack (+explanation)
active - where the hacker tries to modify data on their own remark (DOS)
eavesdropping - where the hacker monitors a network in order to gather information (wiretapping)
external - where someone outside of an organisation tries to hack its network
internal - where someone within an organisation attempts to hack its network
what is a virus
programs embedded within other files. they replicate themselves and become parts of other programs. they cause damage by deleting or modifying data
what is a worm
programs similar to viruses except that they are not hidden within other files. often spread through emails
what is a trojan
programs which pretend tp be legitimate but are actually malware. usually spread through email
what is spyware
programs that monitor user activities and send info back to the hackers
what is ransomware
programs that attempt to trick the user into paying a ransom by either using scare tactics or encrypting documents
what is phishing
emails that trick users into giving away personal information
what is a brute force attack
where a program is used to find a password by trying all possible combinations
what is a DOS attack
where a computer s used to prevent a server from performing tasks by bombarding it with requests
what is data interception and theft
stealing data while it is being transmitted
what is SQL injection
some databases use SQL to store their data so when SQL is inputted it can cause errors
what is the purpose of pen testing
determine how resilient a network is against an attack
what is network forensics
monitoring the traffic on a network. data packets are copied at regular intervals where it is processed and assessed for malicious activity
what is a network policy + 5 examples
a policy set by the network manager to keep the network safe
users have a secure, hard to guess password
users cannot connect unauthorised equipment
access levels are given
a regular backup procedure is in place
regular pen testing and forensics