Forms of Attack and Operating System

studied byStudied by 0 people
0.0(0)
Get a hint
Hint

Passive Attack

1 / 44

45 Terms

1

Passive Attack

Where someone monitors data travelling on a network and intercepts any sensitive information they find.

New cards
2

Network Monitoring Hardware and Software

Tools such as packet sniffers used in passive attacks.

New cards
3

Detection of Passive Attacks

Passive attacks are hard to detect as the hacker is quietly listening.

New cards
4

Defence Against Passive Attacks

The best defence against passive attacks is data encryption.

New cards
5

Active Attack

When someone attacks a network with malware or other planned attacks.

New cards
6

Detection of Active Attacks

Active attacks are more easily detected.

New cards
7

Defence Against Active Attacks

The main defence against them is a firewall.

New cards
8

Insider Attack

Someone within an organisation exploits their network access to steal information.

New cards
9

Brute Force Attack

Type of active attack used to gain information by cracking passwords through trial and error.

New cards
10

Automated Software in Brute Force Attacks

Brute force attacks use automated software to produce hundreds of likely password combinations.

New cards
11

Password Attempts in Brute Force Attacks

Hackers may try lots of passwords against one username or vice versa.

New cards
12

Measures Against Brute Force Attacks

Simple measures like locking accounts after a certain number of failed attempts and using strong passwords will reduce the risk of a brute force attack.

New cards
13

Denial of Service Attack

Where a hacker tries to stop users from accessing a part of a network or website.

New cards
14

Flooding in DoS Attacks

Most DoS attacks involve flooding the network with useless traffic, making the network extremely slow or completely inaccessible.

New cards
15

Malware

Software that can harm devices.

New cards
16

Installation of Malware

Malware (malicious software) is installed on someone's device without their knowledge or consent.

New cards
17

Actions of Malware

Typical actions of malware include deleting or modifying files, locking files, spyware, and rootkits.

New cards
18

Ransomware

A type of malware that encrypts all files on a computer and demands a large sum of money be paid in exchange for a decryption key.

New cards
19

Spyware

Malware that secretly monitors user actions.

New cards
20

Rootkits

Malware that alters permissions, giving malware and hackers administrator-level access to devices.

New cards
21

Viruses

Malware that attacks by copying themselves to certain files and spreads when users copy infected files and activate them by opening infected files.

New cards
22

Worms

Malware similar to viruses that self-replicate without any user help, spreading very quickly by exploiting weaknesses in network security.

New cards
23

Trojans

Malware disguised as legitimate software.

New cards
24

Trojans

Unlike viruses and worms, Trojans don't replicate themselves - users install them not realising they have a hidden purpose.

New cards
25

Social Engineering

A way of gaining sensitive information or illegal access to networks by influencing people, usually the employees of large companies.

New cards
26

Phishing

Phishing is when criminals send emails or texts to people claiming to be from a well-known business, e.g. the bank or online retailer.

New cards
27

SQL Injections

SQL injections are pieces of SQL typed into a website's input box which then reveal sensitive information.

New cards
28

Structured Query Language (SQL)

SQL stands for Structured Query Language - it's one of the main coding languages used to access information in databases.

New cards
29

Preventing Network Vulnerabilities

Regularly test the network to find and fix security weaknesses and investigate any problems.

New cards
30

Penetration Testing

Penetration testing is when organisations employ specialists to stimulate potential attacks on their network.

New cards
31

Physical Security

Physical security protects the physical parts of a network from either intentional or unintentional damage.

New cards
32

Passwords

Passwords help prevent unauthorised users accessing the network.

New cards
33

User Access Levels

User access levels control which parts of the network different groups of users can access.

New cards
34

Anti-malware

Anti-malware software is designed to find and stop malware from damaging a network and the devices on it.

New cards
35

Encryption

Encryption is when data is translated into a code which only someone with the correct key can access.

New cards
36

Cipher Text

Encrypted text is called cipher text, while non-encrypted data is called plain text.

New cards
37

Plain Text

Non-encrypted data is called plain text.

New cards
38

Anti-phishing features

Many email programs, browsers and firewalls have anti-phishing features that will reduce the number of phishing emails received.

New cards
39

Input Validation

If the website's SQL code does not have strong enough input validation, then someone may be able to enter a piece of SQL code which allows them to access other people's account information.

New cards
40

Firewalls

Firewalls examine all data entering and leaving the network and block any potential threats.

New cards
41

Malicious Software

Malicious software attacks are prevented and destroyed by installing anti-malware and firewall software.

New cards
42

Locks and Passcodes

Locks and passcodes restrict access to certain areas, e.g. server rooms.

New cards
43

Surveillance Equipment

Surveillance equipment, e.g. cameras or motion sensors, is used to deter intruders.

New cards
44

Strong Passwords

Passwords should be many characters long, use a combination of letters, numbers and symbols - and be changed regularly.

New cards
45

Educating Employees

The best way for companies to prevent social engineering attacks is by educating employees on the risks and what to look out for.

New cards

Explore top notes

note Note
studied byStudied by 2 people
... ago
5.0(1)
note Note
studied byStudied by 26467 people
... ago
4.5(126)
note Note
studied byStudied by 14 people
... ago
5.0(2)
note Note
studied byStudied by 55 people
... ago
5.0(1)
note Note
studied byStudied by 1 person
... ago
5.0(1)
note Note
studied byStudied by 17 people
... ago
5.0(1)
note Note
studied byStudied by 158 people
... ago
5.0(1)
note Note
studied byStudied by 7 people
... ago
5.0(1)

Explore top flashcards

flashcards Flashcard (20)
studied byStudied by 1 person
... ago
5.0(1)
flashcards Flashcard (29)
studied byStudied by 1 person
... ago
5.0(1)
flashcards Flashcard (98)
studied byStudied by 23 people
... ago
4.0(1)
flashcards Flashcard (161)
studied byStudied by 8 people
... ago
5.0(1)
flashcards Flashcard (67)
studied byStudied by 16 people
... ago
5.0(1)
flashcards Flashcard (43)
studied byStudied by 9 people
... ago
5.0(1)
flashcards Flashcard (41)
studied byStudied by 4 people
... ago
5.0(1)
flashcards Flashcard (48)
studied byStudied by 9 people
... ago
5.0(1)
robot