Unit 1.4. Network Security Flashcards

(21 cards)

1
Q

Malware

A

Software programs designed to cause damage to a computer system and steal information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Viruses

A

A type of malware that attaches itself to legitimate files and programs, spreading. This can cause harm to files, altering them and slowing down computer performance but also compromising sensitive data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Worms

A

A type of self-replicating malware that spreads across networks by exploiting security vulnerabilities, without needing to attach itself to another program to spread

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Trojan Horses

A

A type of malware that disguises itself as a harmless program, to trick users into installing it onto their computers. This can extort sensitive data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Ransomware

A

A type of malware designed to seize access to your files and computer system, holding them for ransom to extort money from the user

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Spyware

A

A type of malware that enters a user’s computer, gathers data from the device and user, and sends it to third parties without their consent.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Pharming

A

A type of online fraud that uses malicious code to direct victims to spoofed websites, to steal private details (e.g. account number, login password etc.)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Social Engineering

A

Methods used to trick people into divulging sensitive information, by preying on human fears and instincts.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Phishing

A

A type of fraud in the form of fake emails and messages from supposedly ‘legitimate’ companies, designed to extort private information by tricking the user

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Pretexting/ blagging

A

A social engineering tactic where a person uses a convincing but fake story or scenario to deceive someone into compromising sensitive information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Shouldering

A

A social engineering tactic where someone looks at a person’s private information, like a PIN or password, by looking over their shoulder

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Brute Force Attacks

A

A trial-and-error method used by hackers to guess login credentials by systematically trying all possible combinations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Distributed Denial of Service (DDoS)

A

A coordinated attack with the intention of disrupting the normal functioning of a network, website or server by using an army of compromised machines, a botnet, to send many simultaneous requests to overload network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Packet Sniffing

A

The interception and examination of data packets as they travel across a network, in order to collect private and sensitive information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Man In The Middle (MITM) attacks

A

A cyberattack where an attacker intercepts communication between two parties to eavesdrop or tamper with the data being exchanged

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

SQL injections

A

An active cyber attack where a malicious SQL command is entered into a website’s input fields (like a login or search box) to gain unauthorized access to data from a database, in order to delete, view or modify it

17
Q

Penetration testing

A

The process of using “ethical hacking” methods to find and exploit vulnerabilities in a system, in order to test its resilience if faced with malicious hackers or malware

18
Q

Anti Malware Software

A

A program designed to prevent, detect, and remove malware from your computer or network, scanning the network for worms, viruses and trojans.

19
Q

Firewalls

A

A network security system that acts as a barrier between a network and the internet by monitoring incoming and outgoing network traffic. It blocks and filters inappropriate content.

20
Q

User Access Levels

A

A hierarchy of permissions that determine what files, software, and other resources a user can interact with on a computer or network.

21
Q

Encryption

A

The process of encoding a message/information, which can only be decoded using a key, so only authorised persons can access and understand it