1/24
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced | Call with Kai |
|---|
No analytics yet
Send a link to your students to track their progress
Malware
Malicious software designed to damage, disrupt or gain unauthorised access to a system
Social engineering
Manipulating people into revealing information or performing actions that compromise security.
brute-force attack
A method of trying every possible password or key until the correct one is found
Denial of service attack
An attack that floods a system or network with traffic to make it unavailable to users
Distributed DoS attack
A DoS attack launched from many compromised computers at once to overwhelm a target
Data interception
Unauthorised access to data as it is transmitted over a network
SQL injection
An attack where malicious SQL commands are entered into input fields to access or modify a database.
Penetration testing
Simulated cyberattacks performed to identify and fix security vulnerabilities
Anti-malware
Software that detects, removes and prevents malware infections
Firewall
Security software or hardware that filters network traffic to block unauthorised access.
User access levels
Permissions that control what different users can access or change within a system
passwords
A method of authentication where users enter a secret string to verify identity.
encryption
Converting data into ciphertext so it cannot be understood if intercepted without the correct key
Physical security
Measures that protect computer systems and hardware from physical damage or theft.
name 4 types of malware
viruses, worms, trojans, ransomware
How does a virus differ from a worm (3)
worms automatically self-replicate across networks but viruses require a host file to attach itself to.
worms do not need user interaction but viruses need user action to activate
worms do not modify programs but viruses alter files.
trojans
Malicious code disguised as legitimate software which the user wants.
What is ransomware?
Holds a computer hostage by locking or encrypting access to it.
How can hackers exploit vulnerabilities?
unpatched software - lack of updates
out of date anti-malware
What does SQL stand for?
Structured Query Language
3 key words in SQL
SELECT, FROM, WHERE
What does the SELECT command do?
choose which fields to get data from
How can you obtain the data from all the fields?
*
What does the FROM command do?
state the table to get the data from
What does the WHERE command do?
specifies the criteria that the field values must meet for the record to be included.