network security - forms of attacks

studied byStudied by 0 people
0.0(0)
learn
LearnA personalized and smart learning plan
exam
Practice TestTake a test on your terms and definitions
spaced repetition
Spaced RepetitionScientifically backed study method
heart puzzle
Matching GameHow quick can you match all your cards?
flashcards
FlashcardsStudy terms and definitions

1 / 28

29 Terms

1

what are the main types of network attacks (6)

  • malware

  • social engineering

  • brute force attacks

  • ddos attacks

  • data interception

  • sql injection

New cards
2

what does malware mean

malicious software used to harm a computer system

New cards
3

issues caused by malware (3)

  • files being deleted, corrupted or encrypted

  • internet connection becoming slow or unusable

  • computer crashing or shutting down

New cards
4

types of malware (5)

  • trojan horse

  • virus

  • worms

  • ransomware

  • spyware

New cards
5

what is a virus

a program that can replicate itself cause unwanted and unexpected events to occur

New cards
6

issues caused by viruses (3)

  • corrupted files

  • deleted data

  • applictions prevented from running correctly

New cards
7

what is a worm

malware similar to a virus that can spread to other drives and computers on the network

New cards
8

ways worms can infect another computer through (4)

  • infected website

  • instant message services

  • email

  • network connections

New cards
9

what is a trojan horse

malware that is disguised as legitimate software but contains malicious code in the background

New cards
10

what is spyware

software that allows a person to spy on user’s activities on their devices

New cards
11

what can spyware do (3)

  • record your screen

  • log your keystrokes

  • gain access to passwords

New cards
12

where is spyware often recieved from

spyware is often embedded into games or programmes that have been downloaded from illegitimate sources

New cards
13

what is ransomware (3)

  • malware that locks your device and encrypts important files

  • a demand for money is made for the user to gain back access

  • there is no guarantee that they will get their data back though

New cards
14

what is social engineering

exploiting weaknesses in a computer system by targeting the people that use or have access to them

New cards
15

types of social engineering (3)

  • fraud phone calls

  • phishing

  • pretexting

New cards
16

what are fraud phone calls

pretending to be someone else to gain access to their account or their details

New cards
17

what is phishing

sending fraud mails to lots of email addresses, claiming to be from a reputable company to gain access to your details

New cards
18

what is pretexting

a fake text message pretending to be from the government or a company to trick you into giving confidential data

New cards
19

what are human errors (5)

  • not locking doors to server rooms

  • not locking their devices

  • sharing passwords

  • not encrypting data

  • not keeping up with software or anti-malware updated

New cards
20

what is a brute force attack

multiple combinations of a user's password are tried to gain unauthorised access to their accounts or devices

New cards
21

what is a dictionary attack

when popular words or phrases for passwords are tried to guess the password as quickly as possible

New cards
22

what is a denial of service attack

when an attacker repeatedly sends requests to flood a server with traffic causing it to overload the system slow it down and make it unusable

New cards
23

traffic comes from multiple distributed devices in a coordinated attack on a single server/network

New cards
24

what is a botnet

multiple internet-connected devices that have been infected with malware and can be controlled remotely by an attacker

New cards
25

purpose of a denial of service attack

prevents customers from accessing or using a service causing companies to lose money and damage their reputation

New cards
26

what is data interception

when sensitive information is intercepted when being transmitted across a network to gain unauthorised access

New cards
27

what is a packet sniffer

able to collect the data that is being transferred on a network

New cards
28

what is sql

a language used to create, access and manipulate a database

New cards
29

what is an sql injection

when an sql command is entered into a web text field to manipulate the SQL query to insert modify or delete data

New cards

Explore top notes

note Note
studied byStudied by 23 people
680 days ago
5.0(1)
note Note
studied byStudied by 5220 people
688 days ago
4.6(34)
note Note
studied byStudied by 2 people
16 days ago
5.0(1)
note Note
studied byStudied by 9 people
684 days ago
5.0(2)
note Note
studied byStudied by 8 people
1019 days ago
5.0(1)
note Note
studied byStudied by 16 people
448 days ago
5.0(1)
note Note
studied byStudied by 42 people
84 days ago
5.0(1)
note Note
studied byStudied by 3 people
126 days ago
5.0(1)

Explore top flashcards

flashcards Flashcard (75)
studied byStudied by 8 people
319 days ago
5.0(1)
flashcards Flashcard (69)
studied byStudied by 37 people
80 days ago
5.0(2)
flashcards Flashcard (114)
studied byStudied by 9 people
673 days ago
5.0(1)
flashcards Flashcard (51)
studied byStudied by 4 people
665 days ago
5.0(1)
flashcards Flashcard (35)
studied byStudied by 18 people
117 days ago
4.5(2)
flashcards Flashcard (159)
studied byStudied by 5 people
769 days ago
5.0(1)
flashcards Flashcard (88)
studied byStudied by 9 people
531 days ago
4.0(1)
flashcards Flashcard (24)
studied byStudied by 38 people
1 day ago
5.0(1)
robot