1.4 network security

0.0(0)
studied byStudied by 2 people
0.0(0)
full-widthCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/36

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

37 Terms

1
New cards

What are the different types of attack on computer systems and networks?

  • Malware

  • Social engineering

  • Brute-force attacks

  • Denial of service (DoS) attacks

  • Data interception and theft

  • SQL injection

2
New cards

What is the purpose of malware?

To damage or gain unauthorised access to a computer system.

3
New cards

What are the types of malware?

  • Virus

  • Worm

  • Trojan

  • Spyware

  • Ransomware

4
New cards

How does a virus spread?

It is attached to a file that when opened, activates the virus causing it to replicate itself across the system by attaching itself to other files.

5
New cards

What threats does a virus pose on a computer system?

It can modify and delete data or stop the whole system from working.

6
New cards

How does a worm spread?

It replicates itself from one computer system to another by finding weaknesses across a network.

7
New cards

What threats does a worm pose on a computer system?

It slows down a computer system by consuming network bandwidth and system resources.

8
New cards

How does a trojan work?

It appears like a legitimate program, tricking users into installing it.

9
New cards

What threats does a trojan pose on a computer system?

It steals user data by creating a ‘backdoor’ for attackers.

10
New cards

How does spyware work?

It is installed alongside legitimate software, unknowing to the user.

11
New cards

What threat does spyware pose on a computer system?

It steals personal user data by monitoring user activity.

12
New cards

How does ransomware work?

It is either downloaded by opening phishing emails or by malicious downloads.

13
New cards

What threat does ransomware pose on a computer system?

It encrypts user data so that the user can no longer access it unless a ransom is paid.

14
New cards

How does social engineering work?

A person may pose as a trusted source in order to trick others into revealing their personal information.

For example, someone pretending to be a school IT technician in order to steal a student’s username and password.

15
New cards

What is the purpose and threat of social engineering?

To gain unauthorised access to personal information, enabling the attacker to steal and use the data.

16
New cards

How does a brute-force attack work?

It tests every possible password combination until the correct one is found.

17
New cards

What is the purpose and threat of a brute-force attack?

To gain unauthorised access to a computer system, giving the attacker the ability to steal and use the data for malicious purposes or modify it.

18
New cards

How does a DoS (Denial of Service) attack work?

A computer repeatedly sends (floods it with_) requests to a server which are more than what it can process.

A DDoS (Distributed Denial of Service) attack involves a network of infected computers controlled by the attacker (a botnet) sending requests to the server. 

19
New cards

What is the purpose and threat of a DoS attack?

To slow network access to the server, meaning the service may become unavailable for a period of time and cause a loss in business revenue.

20
New cards

How does data interception and theft work?

A third party intercepts data packets on a network using a packet sniffer or physical cable and copies it to a different location than the intended one.

21
New cards

What is the purpose and threat of interception and theft?

To gain unauthorised access to data and to steal it, allowing the attacker to steal and use it for malicious purposes.

22
New cards

How does an SQL injection work?

A malicious SQL command is entered into a data input box on a website in order to gain access to the website’s database.

23
New cards

What is the purpose and threat of an SQL injection?

To gain unauthorised access to a website’s database, enabling the attacker to steal user data.

24
New cards

What are common methods of preventing a computer system from vulnerabilities to a threat?

  • Penetration testing

  • Anti-malware software

  • Firewalls

  • User access levels

  • Passwords

  • Encryption

  • Physical security

25
New cards

What is penetration testing?

A prevention method where a person attempts to break into a computer system in order to identify any vulnerabilities.

26
New cards

What threats does penetration testing limit and how?

It can protect against an SQL injection by identifying vulnerabilities on a computer before attackers do.

27
New cards

What is anti-malware software?

A prevention method in which malware is located and deleted from a computer system.

  • scans files for malware

  • blocks malicious file downloads

  • alerts users if malware is detected

28
New cards

What threats does anti-malware software limit and how?

It protects against malware, spyware and viruses by locating and deleting them.

29
New cards

What is a firewall?

A prevention method where all incoming and outgoing network traffic is monitored to check whether data packets should be given access to the network.

  • blocks access to insecure/malicious websites

  • blocks certain programs from accessing the internet

  • blocks unauthorised downloads

30
New cards

What threats does a firewall limit and how?

It protects against brute-force attacks and DoS attacks by filtering out and blocking unauthorised/unexpected traffic.

31
New cards

What are user access levels?

A prevention method that only allows certain users to access and edit particular files through:

  • different user account levels

  • file permissions

32
New cards

What threats do user access levels limit and how?

They protect against social engineering and data interception + theft as only authorised users can access and edit files.

33
New cards

What threats do secure passwords limit and how?

It protects against brute-force attacks by minimising the chances of an unauthorised user accessing a system.

34
New cards

What is encryption?

A prevention method where an algorithm scrambles data into an unreadable format so that attackers cannot understand it if intercepted during transmission. 

A key is used to decrypt the data at the correct destination.

35
New cards

What threats does encryption limit and how?

It limits data interception + theft from being effective by making it impossible to understand the data that has been intercepted/stolen.

36
New cards

What is physical security?

A prevention method in which physical security like locks, CCTV footage, keycards are used to prevent unauthorised personnel from accessing data.

37
New cards

What threats does physical security limit and how?

It limits data theft from happening by only allowing authorised users to access the data.