Computing SLR5

0.0(0)
studied byStudied by 1 person
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/17

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

18 Terms

1
New cards

penetration testing?

attempting to gain access to recourses without knowledge of passwords and other means of access

2
New cards

firewall?

  • software or hardware

  • only lets certain types of traffic through while blocking others, improving network security.

3
New cards

white box pt

simulates a malicous insider who has knowledge of basic credentials for the system

4
New cards

black box pt

simulates an externam hacking attempt against a company/organisation

5
New cards

user access control

  • user access levels

  • only someone with valid username and password will be able to gain access

6
New cards

malware?

software written to infect computers allowing you to conduct fraud and identity theft

  • virus

  • worms

  • trojans

  • spyware

  • ransomware

  • keyloggers

  • etc

7
New cards

virus?

a piece of code capable of copying itself

  • corrupting system or destroying data

  • cannot spread without human interaction

8
New cards

worm

a piece of code that can self-replicate and spread without human interaction

9
New cards

Trojan

a program that appears harmless but is malicious

  • when installed can create a backdoor into victims system

10
New cards

ransomware

a type of malware that encrypts a victim's files and demands ransom for the decryption key

11
New cards

Keylogger

software that obtains covert info about a users computer activities by silently monitoring and recording

12
New cards

pretexting

a form of social engineering where an attacker creates a fabricated scenario to obtain personal information from a victim.

13
New cards

phishing

sending emails that appear to be from legitimate sources to trick recipients into revealing sensitive information.

14
New cards

baiting

the promise of cash or goods that people with malicious intent use to entice victims

15
New cards

quid pro quo

a social engineering tactic where an attacker offers a service or benefit in exchange for personal information, often posing as a legitimate authority.

16
New cards

anti-malware software

software designed to detect, prevent, and remove malicious software from computers and networks.

→ scanning files and comparing their contents with a library of known malware

17
New cards

encryption

converting data into a coded format to prevent unauthorized access, ensuring that only those with the correct decryption key can read the information.

18
New cards