Systems Software and Security Flashcards
Malware
Software designed to disrupt, damage, or gain authorised access to a computer system (e.g viruses)
Virus
A form of malware installed on a computer without the owners knowledge of permission, with the purpose of causing harm. It includes instructions to replicate automatically.
Phishing
Phishing emails are designed to steal money, identity or login details
Blagging
The act of knowingly or recklessly obtaining or disclosing personal data or information without the consent of the controller
Brute force attacks
An attack that goes through a list of different passwords or letters until access is gained
DOS
Denial of service attacks are an attempt to prevent legitimate users from accessing a website, by flooding a company’s network with useless traffic, or by sending out millions of spam emails from an account, preventing legitimate emails from being sent
Shouldering
Looking over someones shoulder while they type their PIN or password
SQL injection
Structured Query Language injection inserts malicious code into a database field on a website, exploiting security weaknesses
Methods to identify vulnerabilities
Network forensics and penetration testing
Network forensics
Using specialist software to look at transactions to verify they are not fraudulent, or stop a security attack
Penetration testing
- Gathering information about the targets of possible attacks
- Identifying potential entry points
- Attempting to break in
- Report back the findings
Internal penetration testing
Tests how much damage could be done by an employee
Network policies
Policies that determine acceptable use of networks
Anti-malware software
- Prevents harmful programs from being installed
- Prevents important files, such as the operating system from being changed or deleted
- Detects installed malware during regular scans and removing them
Firewall
Designed to prevent unauthorised access to or from a private network or intranet. All messages entering or leaving the intranet pass through the firewall, which blocks those which don’t meet specified security criteria.