Save
...
Paper 1
1.4 Network Security
1.4.1 Threats to Computer Systems and Networks
Save
Share
Learn
Content
Leaderboard
Share
Learn
Created by
Pav Bath
Visit profile
Cards (22)
What is malware?
Malware is a piece of
software
/code/program that
replicates
itself and causes damage.
View source
How can malware be prevented?
By running
anti-virus
/anti-malware software and avoiding unknown
downloads
and links.
View source
What does spyware do?
Spyware records actions/key presses and sends this data to a
third party
for analysis.
View source
What is ransomware?
Ransomware prevents access to files unless a
ransom
is
paid.
View source
What are the different types of malware and their descriptions?
**
Viruses
**: Programs embedded within other files that replicate and cause damage.
**
Worms
**: Standalone programs that spread through emails.
**
Trojans
**: Malware disguised as legitimate software that deceives users into installation.
**
Spyware
**: Monitors user activities and sends information to hackers.
**
Ransomware
**: Blackmails users for payment to regain access to files.
View source
What are the effects of malware on computer systems?
Malware can delete/corrupt files, change data, prevent access,
replicate
, record
keypresses
, steal data, and slow
network
speed.
View source
What are the methods to prevent malware?
Use
anti-spyware
Use
anti-malware
Use
anti-virus
Implement a
firewall
View source
What is social engineering in the context of computer security?
Social engineering refers to exploiting human behavior as a weak point in
security systems
.
View source
What is phishing?
Phishing is an
email
scam that directs users to a fake website to collect
personal data
.
View source
How can phishing be prevented?
By implementing
network policies
,
firewalls
, and
educating
users about unknown links.
View source
What is pharming?
Pharming involves installing
code
that redirects users to fake websites to collect
personal data
.
View source
How can pharming be prevented?
By using
anti-malware
,
firewalls
, and checking web addresses for
validity
.
View source
What are the countermeasures for staff being the weak point in security?
Prevent external devices from being used on the network.
Block access to
insecure websites
.
Restrict access to
USB ports
, email, internet, and printing.
View source
What is a brute-force attack?
A brute-force attack is when a program tries all possible combinations of characters to find a
password
.
View source
What are the effects of a brute-force attack?
It can gain access to
accounts
, edit or delete data, install
malware
, and block access to accounts.
View source
What are the methods to prevent brute-force attacks?
Use a
firewall
Set a limit on
password attempts
Implement
strong passwords
Use
two-step verification
View source
What is a denial of service attack?
A denial of service attack prevents a
server
from performing tasks by bombarding it with requests.
View source
How can denial of service attacks be prevented?
By using a
proxy server
or
firewall
.
View source
What is data interception and theft?
Data interception and theft occur when data is intercepted during transmission using a
packet sniffer
.
View source
How can data interception and theft be prevented?
By using
encryption
.
View source
What is SQL injection?
SQL injection is when
SQL
code
is
entered
as
data
input
, causing
errors
or
unintended
operations.
View source
How can SQL injection be prevented?
By using
network forensics
and suitable form
validation
.
View source