network security

0.0(0)
studied byStudied by 2 people
full-widthCall with Kai
GameKnowt Play
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/31

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

32 Terms

1
New cards

What are the different types of attack on computer systems and networks?

  • Malware

  • Social engineering

  • Brute-force attacks

  • Denial of service (DoS) attacks

  • Data interception and theft

  • SQL injection

2
New cards

What is the purpose of malware?

To damage or gain unauthorised access to a computer system.

3
New cards

What are the types of malware?

  • Virus

  • Worm

  • Trojan

  • Spyware

  • Ransomware

4
New cards

How does a virus spread?

It is attached to a file that when opened, activates the virus causing it to replicate itself across the system by attaching itself to other files.

5
New cards

What threats does a virus pose on a computer system?

It can modify and delete data or stop the whole system from working.

6
New cards

How does a worm spread?

It replicates itself from one computer system to another by finding weaknesses across a network.

7
New cards

What threats does a worm pose on a computer system?

It slows down a computer system by consuming network bandwidth and system resources.

8
New cards

How does a trojan work?

It appears like a legitimate program, tricking users into installing it.

9
New cards

What threats does a trojan pose on a computer system?

It steals user data by creating a ‘backdoor’ for attackers.

10
New cards

How does spyware work?

It is installed alongside legitimate software, unknowing to the user.

11
New cards

What threat does spyware pose on a computer system?

It steals personal user data by monitoring user activity.

12
New cards

How does ransomware work?

It is either downloaded by opening phishing emails or by malicious downloads.

13
New cards

What threat does ransomware pose on a computer system?

It encrypts user data so that the user can no longer access it unless a ransom is paid.

14
New cards

How does social engineering work?

A person may pose as a trusted source in order to trick other into revealing their personal information.

For example, someone pretending to be a school IT technician in order to steal a student’s username and password.

15
New cards

What is the purpose and threat of social engineering?

To gain unauthorised access to personal information, enabling the attacker to steal and use the data.

16
New cards

How does a brute-force attack work?

It tests every possible password combination until the correct one is found.

17
New cards

What is the purpose and threat of a brute-force attack?

To gain unauthorised access to a computer system, giving the attacker the ability to steal and use the data for malicious purposes or modify it.

18
New cards

How does a DoS (Denial of Service) attack work?

A computer repeatedly sends requests to a server in order to overload it.

A DDoS (Distributed Denial of Service) attack involves a network of infected computers controlled by the attacker (a botnet) sending requests to the server. 

19
New cards

What is the purpose and threat of a DoS attack?

To slow the performance of the server, meaning the service may become unavailable for a period of time and cause a loss in business revenue.

20
New cards

How does data interception and theft work?

A third party intercepts data packets on a network using a packet sniffer or physical cable and copies it to a different location than the intended one.

21
New cards

What is the purpose and threat of interception and theft?

To gain unauthorised access to data and to steal it, allowing the attacker to steal and use it for malicious purposes.

22
New cards

How does an SQL injection work?

A malicious SQL command is entered into a data input box on a website in order to gain access to the website’s database.

23
New cards

What is the purpose and threat of an SQL injection?

To gain unauthorised access to a website’s database, enabling the attacker to steal user data.

24
New cards

What are common methods of preventing a computer system from vulnerabilities to a threat?

  • Penetration testing

  • Anti-malware software

  • Firewalls

  • User access levels

  • Passwords

  • Encryption

  • Physical security

25
New cards
26
New cards
27
New cards
28
New cards
29
New cards
30
New cards
31
New cards
32
New cards