Save
Computer Science (Personal)
1.4 Network Security
Malware, Fishing, Brute-Force
Save
Share
Learn
Content
Leaderboard
Share
Learn
Created by
Eoin H
Visit profile
Cards (27)
What is a network policy?
A set of rules users must adhere to for appropriate working behaviors.
View source
What are
user access levels
?
Different
groups
of users with varying
degrees
of system access.
View source
What is
penetration testing
?
Permissioned
attempts to hack a system to reveal weaknesses.
View source
What is
malware
?
Any software that can harm a
computer
or user.
View source
What is the primary aim of
viruses
?
To cause physical harm to a
computer system
.
View source
How do standard
viruses
operate?
They hide in files and
replicate
to spread to other programs.
View source
What distinguishes
worms
from standard
viruses
?
Worms replicate without necessarily damaging data.
View source
What is a
Trojan virus
?
A
program
that appears useful but causes harm in the background.
View source
What is the purpose of
spyware
?
To spy on users and collect their
personal
information.
View source
What is a
key logger
?
A type of
spyware
that records every keystroke made by the user.
View source
What does
adware
aim to do?
To download unwanted
adverts
and collect marketing information.
View source
How does
pharming
work?
It changes the
IP address
in the
DNS
to redirect users to fake websites.
View source
What is
scareware
?
Malware
that pretends to detect a virus to sell software.
View source
What is
ransomware
?
Malware
that locks a computer and demands payment to unlock it.
View source
What are
rootkits
?
Tools that allow criminals to access a computer at an
administrator
level.
View source
What is
phishing
?
A
method
to acquire
sensitive
information through impersonation.
View source
How do
phishing
attacks typically occur?
Through emails or phone calls impersonating legitimate companies.
View source
What is a common sign of a
phishing
email
?
Poor spelling and grammar.
View source
What is a
brute force attack
?
A method where criminals use trial and error to guess
passwords
.
View source
How can
brute force
attacks be mitigated?
By locking accounts after multiple unsuccessful
login
attempts.
View source
What is a
Denial of Service
(
DoS
) attack?
A method that overwhelms a server with traffic to crash it.
View source
How do
hackers
intercept data?
By using
hardware
and
software
to monitor
network traffic
.
View source
What is the purpose of
encryption
in data transmission?
To make data unreadable if
intercepted
.
View source
What does
SQL
stand for?
Structured Query Language
.
View source
How do
SQL
injections work?
By adding SQL code to manipulate
database
queries.
View source
What is an example of an
SQL
statement?
SELECT
account WHERE
username
= "bjones"
AND
password
= "pa$$w0rd"
View source
What measures do websites take against
SQL injections
?
They validate that only a
password
is entered without extra SQL code.
View source