What is malware?
Malicious software designed to disrupt
What is a computer virus?
Malware that attaches to files/programs
What is a Trojan?
.Malware disguised as legitimate software
.Once installed acts as a virus / by example of action e.g. deleting files / allows unauthorised access
What is spyware?
Malware that secretly collects user activity data like keystrokes or browsing habits and sends it to attackers
What is social engineering?
People are often the weakest link in security
* Using deception to manipulate users
* …to gain personal data
What is phishing?
. Fake emails sent to person / click on link from fake email
. Person sends personal data / gives away personal data
What is a brute-force attack?
Automated attack trying many username/password combinations until the correct one is found
What is a denial of service (DoS) attack?
. Multiple requests sent to a server (simultaneously) / server is flooded with requests
. More requests than the server can process / uses all of the bandwidth available
. Server cannot respond / server crashes/denies access / stops access to a network / slows access to a network
What is Pharming?
.Software that redirects user to fake website / use of a fake website
. Person enters personal data / gives away personal data
What is data interception and theft?
Capturing data transmitted over a network without permission
What is SQL injection?
Malicious SQL code entered into input fields to gain unauthorised access to databases and data
What is penetration testing?
Attempting to gain unauthorised access to identify vulnerabilities before real attacks occur
What is anti-malware software?
Anti-malware
. Scans for / identifies virus/spyware/malware
. Compares data to a database of malware
. Alerts user and requests action such as ..
. Quarantines/deletes virus/spyware/malware
. Stops the download of virus/spyware/malware
What is a firewall?
Firewall
. Scans incoming and outgoing traffic
. Compares traffic to a criteria
. Blocks traffic that is unauthorised
. Blocks incoming/outgoing traffic
What are Anti-Viruses?
. Scans for / identifies virus/malware
. Compares data to a database of viruses/malware
. Alerts user and requests action such as ..
. Quarantines/deletes virus/spyware
. Stops the download of virus/malware
What are user access levels?
User access levels
. Data can be read/write/ read-write / by example
. Prevents accidental changes
. Limits data users can access
Why are passwords important?
Passwords/biometrics/authentication
. code/fingerprint etc. has to be correctly entered to gain
access
. strong password / letters, numbers, symbols / fingerprint is
unique to individual …
. harder/impossible for a brute force attack to succeed
. lock after set number of failed attempts
What is encryption?
Encryption
. Scrambles data
. …using an algorithm
. So if intercepted it cannot be understood
. Key needed to decrypt
What is physical security?
. Locks
. Key-card entry
. Biometric entry to room
. Passcode entry to room
. Alarms
. Security guards/team
. CCTV
Which prevention methods limit malware?
Anti-malware software
Which prevention methods limit SQL injection
Penetration Testing
Which prevention methods limit denial of service attacks?
Firewalls
Which prevention methods limit insider threats and low-level account damage?
User access levels
Which prevention methods limit brute-force attacks?
Passwords