Network security

0.0(0)
Studied by 0 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
full-widthPodcast
1
Card Sorting

1/24

encourage image

There's no tags or description

Looks like no tags are added yet.

Last updated 2:33 PM on 4/4/26
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

25 Terms

1
New cards

Malware

Malicious software designed to damage, disrupt or gain unauthorised access to a system

2
New cards

Social engineering

Manipulating people into revealing information or performing actions that compromise security.

3
New cards

brute-force attack

A method of trying every possible password or key until the correct one is found

4
New cards

Denial of service attack

An attack that floods a system or network with traffic to make it unavailable to users

5
New cards

Distributed DoS attack

A DoS attack launched from many compromised computers at once to overwhelm a target

6
New cards

Data interception

Unauthorised access to data as it is transmitted over a network

7
New cards

SQL injection

An attack where malicious SQL commands are entered into input fields to access or modify a database.

8
New cards

Penetration testing

Simulated cyberattacks performed to identify and fix security vulnerabilities

9
New cards

Anti-malware

Software that detects, removes and prevents malware infections

10
New cards

Firewall

Security software or hardware that filters network traffic to block unauthorised access.

11
New cards

User access levels

Permissions that control what different users can access or change within a system

12
New cards

passwords

A method of authentication where users enter a secret string to verify identity.

13
New cards

encryption

Converting data into ciphertext so it cannot be understood if intercepted without the correct key

14
New cards

Physical security

Measures that protect computer systems and hardware from physical damage or theft.

15
New cards

name 4 types of malware

viruses, worms, trojans, ransomware

16
New cards

How does a virus differ from a worm (3)

  • worms automatically self-replicate across networks but viruses require a host file to attach itself to.

  • worms do not need user interaction but viruses need user action to activate

  • worms do not modify programs but viruses alter files.

17
New cards

trojans

Malicious code disguised as legitimate software which the user wants.

18
New cards

What is ransomware?

Holds a computer hostage by locking or encrypting access to it.

19
New cards

How can hackers exploit vulnerabilities?

  • unpatched software - lack of updates

  • out of date anti-malware

20
New cards

What does SQL stand for?

Structured Query Language

21
New cards

3 key words in SQL

SELECT, FROM, WHERE

22
New cards

What does the SELECT command do?

choose which fields to get data from

23
New cards

How can you obtain the data from all the fields?

*

24
New cards

What does the FROM command do?

state the table to get the data from

25
New cards

What does the WHERE command do?

specifies the criteria that the field values must meet for the record to be included.

Explore top notes

Explore top flashcards

flashcards
bio ch 2
55
Updated 1237d ago
0.0(0)
flashcards
Killer Angel Quotes
182
Updated 207d ago
0.0(0)
flashcards
english vocab 9
20
Updated 1161d ago
0.0(0)
flashcards
Vocab - Unit 4
26
Updated 1171d ago
0.0(0)
flashcards
Boone Religion Test #1
26
Updated 111d ago
0.0(0)
flashcards
Poems & Authors
26
Updated 1123d ago
0.0(0)
flashcards
Biology Review
72
Updated 1170d ago
0.0(0)
flashcards
bio ch 2
55
Updated 1237d ago
0.0(0)
flashcards
Killer Angel Quotes
182
Updated 207d ago
0.0(0)
flashcards
english vocab 9
20
Updated 1161d ago
0.0(0)
flashcards
Vocab - Unit 4
26
Updated 1171d ago
0.0(0)
flashcards
Boone Religion Test #1
26
Updated 111d ago
0.0(0)
flashcards
Poems & Authors
26
Updated 1123d ago
0.0(0)
flashcards
Biology Review
72
Updated 1170d ago
0.0(0)