Network Attacks and Malware

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/10

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

11 Terms

1
New cards

Define a passive attack

Where someone monitors data travelling on a network and intercepts and sensitive information they find. They can called packet sniffers and they are hard to detect

2
New cards

Define an active attack

When someone attacks a network with malware or other planned attacks. They are easily detected and one of the main defences is a firewall

3
New cards

Define insider attack

When someone inside an organisation exploits their network access to steal information

4
New cards

How does a brute force attack gain access to a network

By cracking a password through trial and error

5
New cards

How does a DoS gain access to a network

As a hacker tries to stop users from accessing a part of the network or website. Most involve flooding the network with useless traffic

6
New cards

What is malware an abbreviation for?

Malicious software

7
New cards

What are the typical actions of malware?

-Deleting or modifying files

-Scareware which tells the user the computer is infected to scare them into paying for the problems to be fixed

-Locking files (ransomware) and needing a sum of money for them to be unlocked

-Spyware which secretly monitors user actions

-Rootkits which gives hackers admin level access to devices

-Opening backdoors (a hole in security)

8
New cards

How does a virus gain access to a device?

They attach themselves to files and users spread them by copying infected files and activate them by opening infected files

9
New cards

What does a worm do meaning it can spread very quickly?

Self-Replicate without any user help to which they exploit weaknesses in a network

10
New cards

What are Trojans?

They are Malware disguised as legitimate software, unlike other malware trojans don’t replicate themselves - users install them not realising their intentions

11
New cards