Security

    Cards (27)

    • what is malware?
      software that can be damaging/malicious to a computer/network
    • what are viruses?
      malware which harm a network/computer by attaching to files
      • can affect all components of an OS
      • can damage or delete data
    • what are worms?
      malware which replicates itself to spread to other computers on a network
      • exploits vulnerabilities in a network
      • does not need to attach to files
    • what is a trojan horse program?
      software designed to access a computer by misleading users of its intent
    • what is social engineering?
      Manipulating people to gain unauthorized access to information or systems
    • what is phishing?
      form of social engineering which is designed to acquire sensitive info
    • what is telephone (IVR) phishing?
      phone calls where someone pretends to be an official service to gain personal data
    • what do scammers need to open a credit card in your name?
      • full name
      • date of birth
      • mother's maiden name
    • how can data be intercepted?
      packets can be intercepted in the air
      • data can be intercepted physically via theft
    • how does encryption help when data is intercepted?
      people who have unauthorised access cannot understand the scrambled data as they do not have a key
    • what are dictionary attacks?
      form of brute force attack where each letter/digit is cycled through until it is correct
    • what is brute force attack?
      a method of gaining access to passwords with trial and error
    • how can brute force attacks be avoided?
      add a cap on the number of attempts when trying a password
    • what is DoS?
      • Denial of Service
      • a server is flooded with requests and becomes overwhelmed
      • can deter genuine clients
      • can happen accidently when a website has high demand
    • what is a DDoS attack?
      Distributed Denial of Service
      • large botnets send many requests to a website so the singular IP cannot be blocked
    • what is a botnet?
      collection of zombie computers that have been infected with code that gives the virus owner the ability to control it
    • what is an SQL injection?
      • an attacker can execute malicious SQL statements to manipulate a website's database
      • can be used to access customer data
    • how can a SQL attack be prevented?
      clean data inputted by removing special characters
    • what is penetration testing?
      tests are performed in a controlled environment by an authorised person to test for any vulnerabilities. may use tools to help them
    • what is a white hat hacker?
      someone who has permission to act as a penetration hacker
    • what is a grey hat hacker?
      a hacker that performs penetration testing without permission and inform the organisation for a fee
    • what is a black hat hacker?
      someone who hacks without permission and with malicious intent
    • what is anti-malware software
      software which can help to prevent malware from infecting a system
    • what is a firewall?
      software that forms a barrier between a potential attacker and the computer to prevent unauthorised access
    • what are user access levels?
      allow a system admin to set up a hierarchy of users, and limiting the access of lower level users
    • adv of biometrics
      • don't rely on memory
      • faster
      harder to hack
    • what is physical security?
      used to prevent physical access to devices e.g. locking doors, CCTV, guards etc