OCR Computer Science 1.4 Network Security

0.0(0)
studied byStudied by 0 people
full-widthCall with Kai
GameKnowt Play
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/18

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

19 Terms

1
New cards

Malware

software that is intended to damage or disable computers and computer systems.

<p>software that is intended to damage or disable computers and computer systems.</p>
2
New cards

Virus

A piece of code that is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data

<p>A piece of code that is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data</p>
3
New cards

Worm

a software program capable of reproducing itself that can spread from one computer to the next over a network, without any human interacction.

<p>a software program capable of reproducing itself that can spread from one computer to the next over a network, without any human interacction.</p>
4
New cards

Keylogger

a malicious program that records keystrokes.

<p>a malicious program that records keystrokes.</p>
5
New cards

Social Engineering

hackers use their social skills to trick people into revealing access credentials or other valuable information

<p>hackers use their social skills to trick people into revealing access credentials or other valuable information</p>
6
New cards

Shoulder surfing

Gaining compromising information through observation (as in looking over someone's shoulder).

<p>Gaining compromising information through observation (as in looking over someone's shoulder).</p>
7
New cards

Phishing

An attack that sends an email or displays a Web announcement that falsely claims to be from a legitimate enterprise in an attempt to trick the user into surrendering private information

<p>An attack that sends an email or displays a Web announcement that falsely claims to be from a legitimate enterprise in an attempt to trick the user into surrendering private information</p>
8
New cards

Brute force attack

the password cracker tries every possible combination of characters

<p>the password cracker tries every possible combination of characters</p>
9
New cards

denial of service attack

a cyber attack in which an attacker sends a flood of data packets to the target computer, with the aim of overloading its resources

<p>a cyber attack in which an attacker sends a flood of data packets to the target computer, with the aim of overloading its resources</p>
10
New cards

Man in the middle attack

a hacker placing himself between a client and a host to intercept communications between them

<p>a hacker placing himself between a client and a host to intercept communications between them</p>
11
New cards

Data interception

Listening' to data as it passes from one device to another

<p>Listening' to data as it passes from one device to another</p>
12
New cards

SQL Injection

An attack that targets SQL servers by injecting commands to be manipulated by the database.

<p>An attack that targets SQL servers by injecting commands to be manipulated by the database.</p>
13
New cards

Penetration Testing

A live test of the effectiveness of security defenses through mimicking the actions of real-life attackers

<p>A live test of the effectiveness of security defenses through mimicking the actions of real-life attackers</p>
14
New cards

Anti malware software

Software designed to stop malware from damaging a computer or network

<p>Software designed to stop malware from damaging a computer or network</p>
15
New cards

Firewall

a part of a computer system or network that is designed to block unauthorized access while permitting outward communication.

<p>a part of a computer system or network that is designed to block unauthorized access while permitting outward communication.</p>
16
New cards

User Access Levels

A network policy that defines which users can see which folders and files and the type of access they have to them. Eg: Read-Only or Read-Write.

<p>A network policy that defines which users can see which folders and files and the type of access they have to them. Eg: Read-Only or Read-Write.</p>
17
New cards

Passwords

private phrases or words that give a particular user a unique access to a particular program or network

<p>private phrases or words that give a particular user a unique access to a particular program or network</p>
18
New cards

Encryption

Process of converting readable data into unreadable characters to prevent unauthorized access.

<p>Process of converting readable data into unreadable characters to prevent unauthorized access.</p>
19
New cards

Physical security

tangible protection such as alarms, guards, fireproof doors, fences, and vaults

<p>tangible protection such as alarms, guards, fireproof doors, fences, and vaults</p>