1.4.1 Threats to Computer Systems & Networks

0.0(0)
studied byStudied by 0 people
0.0(0)
full-widthCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/11

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

12 Terms

1
New cards

What is malware?

An umbrella term for hostile or intrusive software (e.g., viruses, trojans, spyware) designed to damage, disrupt, or gain unauthorised access to a computer system.

2
New cards

What is a computer virus (malware)?

A type of malware that attaches itself to a legitimate program/file and spreads across a network when the file is opened, often to corrupt or delete data.

3
New cards

What is a trojan (malware)?

A malicious program that disguises itself as legitimate software to trick a user into installing it. It can then, for example, create a backdoor for attackers.

4
New cards

What is spyware (malware)?

A type of malware that secretly gathers information about a user’s activity (e.g., keystrokes, browsing habits) and sends this information to the attacker.

5
New cards

What is social engineering?

Manipulating people into giving away confidential information (like passwords or bank details). It targets the human 'weak point' rather than the technology.

6
New cards

What is phishing (social engineering)?

Sending a victim a communication (e.g., an email or text) that looks genuine from a trusted source, containing a link to a fraudulent site to steal personal information.

7
New cards

What is a brute-force attack?

An attack that uses automated software to try thousands of possible password combinations (e.g., using a dictionary of common words) until the correct one is found.

8
New cards

What is a Denial of Service (DoS) attack?

An attack that overwhelms a server or network with a massive number of requests (e.g., high volumes of traffic) in a short time.

9
New cards

What is the purpose of a DoS attack?

To make the server or service slow or completely inaccessible to legitimate users.

10
New cards

What is data interception and theft?

The unauthorised act of accessing (reading) data as it is being transmitted across a network. This is easiest on unsecured networks (like public Wi-Fi).

11
New cards

What is SQL injection?

A technique where a malicious user enters SQL code into a website’s input field (like a search bar). If the input is not validated, the code is run by the database.

12
New cards

What is the purpose of an SQL injection attack?

To view, modify, or delete data from a database that was not intended to be accessed (e.g., stealing user passwords or customer data).