Topic 6: Network Security Flashcards
What is active hacking
Where the hacker attempts to modify or delete data, or to prevent a network from operating correctly.
What is passive hacking
Where the hacker monitors a network in order to gain information.
What is external hacking
Where someone outside of an organisation attempts to hack its network.
What is internal hacking
Where someone within an organisation attempts to hack its network.
What do viruses do
Programs embedded (hidden) within other files. They replicate themselves and become part of other programs. Viruses often cause damage by deleting or modifying data.
What is malware
Malware is malicious software that is designed to hack a system
What do worms do
Programs similar to viruses except that they are not hidden within other files. Worms often spread through emails.
What do trojans do
Programs which pretend to be legitimate but in reality are malware. They are often disguised as email attachments. Trojans cannot spread by themselves - instead they deceive a user into installing the program.
What does spyware do
Programs that monitor user activities (such as websites visited, usernames and passwords used) and send the information back to a hacker.
What does ransomeware do
Programs that attempt to blackmail a user into making a payment to a hacker.
What does phishing do
Emails that try to trick users into giving away personal details. The phishing email pretends to be a genuine message and tries to deceive the user into following a link to a website that looks like the real company, for example, a bank. However, it is a fake website designed to catch data such as bank account numbers and security codes.
How does brute force work
Where a program is used to find a password by trying all possible combinations of characters until the correct one is obtained.
How does Denial of Service work
Where a computer (or many computers) is used to prevent a server from performing its tasks. This makes it very difficult for it to respond to legitimate requests.
How does SQL injection work
Where SQL code is entered as a data input. Many databases use SQL code to interrogate the data and maintain the structure. SQL code can be inputted as data, which can cause errors or unintended operations.