1.4 Network Security

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/19

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

20 Terms

1
New cards

Malware (Malicious Software)

Software that is specifically designed to disrupt, damage, or gain unauthorized access to a computer system.

2
New cards

Viruses

Attach to legitimate files and spread when opened, potentially damaging or deleting data.

3
New cards

Worms

Self-replicating programs that spread without user action and can crash networks.

4
New cards

Trojans

Appear legitimate but give hackers backdoor access to a system.

5
New cards

Spyware

Secretly gathers user data and transmits it to hackers

6
New cards

Adware

Forces unwanted ads onto users and can redirect searches or slow devices.

7
New cards

Phishing

-Attackers impersonate legitimate organisations via email or text, tricking users into revealing passwords, banking details, or installing malware.

-Often includes urgent language or fake links designed to panic users into responding.

8
New cards

Social Engineering

-Manipulating or tricking individuals into revealing confidential information.

-Can include pretexting (pretending to be someone else) or baiting (offering fake rewards).

9
New cards

Brute Force Attacks

-A method of guessing passwords by trying all possible combinations.

-Automated software makes this attack fast and dangerous if passwords are weak.

10
New cards

Denial of Service (DoS) Attacks

-Floods a website or server with massive amounts of traffic, making it slow or completely inaccessible.

-Can be used to disrupt services, cause financial loss, or act as a distraction for another attack

11
New cards

Data Interception & Theft

-Hackers use packet sniffing tools to intercept data as it travels over a network.

-Sensitive data such as login credentials can be stolen if not encrypted.

12
New cards

SQL Injection

-Attackers enter malicious SQL code into input fields (e.g., login forms) to access or manipulate databases.

-Can allow hackers to view, delete, or change data without authorisation.

13
New cards

Threats to Network Security

-Poorly configured firewalls or security settings leave networks open to intrusion.

-Outdated software may contain unpatched vulnerabilities.

Weak or reused passwords make brute-force attacks easier.

-Unsecured wireless networks can be accessed by unauthorised users nearby.

-Human error remains one of the biggest threats (e.g. clicking phishing links or misconfiguring access controls).

14
New cards

Preventing Vulnerabilities:

15
New cards

Penetration Testing

-Ethical hackers test a system to identify weaknesses before real attackers can exploit them.

-Helps organisations strengthen their defences and monitor for flaws.

16
New cards

Anti-malware Software:

-Detects and removes malicious software.

-Offers real-time protection and regular scans to stop known threats.

17
New cards

Firewalls

-Software or hardware that controls incoming and outgoing traffic based on security rules.

-Blocks unauthorised access and alerts users to suspicious activity

18
New cards

Passwords

-Strong passwords are complex, unique, and changed regularly.

-Often combined with two-factor authentication (2FA) for better security.

19
New cards

Encryption

-Converts data into unreadable code during transmission, only accessible with a decryption key.

-Essential for protecting data sent over the internet (e.g., bank details, emails).

20
New cards

Automatic Software Updates

-Ensures software is always patched against known vulnerabilities.

-Reduces the risk of zero-day and other attacks.