Save
...
Paper 1
1.4 Network Security
Summary
Save
Share
Learn
Content
Leaderboard
Share
Learn
Created by
Pav Bath
Visit profile
Cards (31)
What are some forms of cybercrime?
Planting
viruses
, acquiring
personal data
, and
disrupting
services
View source
How do cyber-attacks exploit human weaknesses?
They take advantage of human
gullibility
View source
What is malware?
Malicious
software
designed to cause harm
View source
What is the function of antivirus software?
To prevent
malware
from entering the
system
View source
What is ransomware?
Software
that prevents access to files until a ransom is paid
View source
What is the purpose of spyware?
To record actions and send data to a
third party
View source
How many viruses are created each day?
Around
82,000
viruses
View source
How do viruses spread?
Through
files
,
programs
, or
games
that are downloaded
View source
What distinguishes worms from viruses?
Worms
do not hide within other files
View source
What are Trojan Horses in cybersecurity?
Programs that pretend to be legitimate but are actually
malware
View source
What is social engineering in the context of cybersecurity?
The manipulation of individuals to disclose
private information
View source
What is phishing?
An
email
scam that directs users to fake websites
View source
How can phishing be prevented?
By implementing
network policies
and
firewalls
View source
What is pharming?
A technique that redirects users to
fake
websites
View source
How can pharming be prevented?
By using
anti-malware
and
firewalls
View source
What is a brute force attack?
A trial and error method to gain access to
password systems
View source
What is the purpose of encryption?
To make data unreadable without a
key
View source
What is a DDoS attack?
An attack that floods a
server
with excessive requests
View source
What is SQL injection?
A method that exploits web input forms to
manipulate
databases
View source
What are the effects of a successful SQL injection attack?
Bypassing
authentication
, executing
queries
, and
altering
data
View source
What is an acceptable use policy (AUP)?
A guideline detailing acceptable
behavior
on a network
View source
What is penetration testing?
A method to identify potential
attack targets
and entry points
View source
What is the role of ethical hackers?
To find system
vulnerabilities
before
malicious hackers
exploit them
View source
What is the function of firewalls?
To act as a
barrier
between attackers and the computer system
View source
How do strong passwords help prevent brute force attacks?
By making it difficult for attackers to
guess
passwords
View source
What are biometric security measures?
Security methods using physical characteristics like
fingerprints
View source
What is the purpose of user access levels?
To restrict access to
sensitive data
based on
user roles
View source
How can poor network policy lead to security issues?
By leaving
users
unaware
of
risks
associated with their
actions
View source
What should a network manager ensure regarding user access?
That users can only access
facilities
they need
View source
What are the key components of a network policy?
Defines
security rules
and requirements
Outlines
user access protocols
Ensures users have secure passwords
Regular backups and
disaster recovery procedures
Maintenance of up-to-date
security software
View source
What are the strengths and weaknesses of different malware types?
Strengths:
Viruses
replicate and spread through files
Ransomware
can encrypt data for ransom
Spyware
collects sensitive information
Weaknesses:
Malware can be detected by
antivirus software
Users can be educated to avoid
phishing
Firewalls
can block unauthorized access
View source
See similar decks
OCR GCSE Computer Science
1937 cards
Edexcel GCSE Computer Science
2949 cards
AQA GCSE Computer Science
2308 cards
OCR A-Level Computer Science
2091 cards
AP Computer Science Principles
1196 cards
AP Computer Science A
1898 cards
OCR GCSE Geography
2028 cards
OCR GCSE History
605 cards
OCR GCSE Business
1914 cards
4.1.5 Network security:
Edexcel GCSE Computer Science > Topic 4: Networks > 4.1 Computer Networks
59 cards
OCR GCSE Economics
707 cards
OCR GCSE Mathematics
1262 cards
OCR GCSE Physics
1265 cards
3.5.5 Network security
AQA GCSE Computer Science > 3.5 Fundamentals of computer networks
23 cards
OCR GCSE Biology
2284 cards
OCR GCSE Religious Studies
2675 cards
OCR GCSE Business Studies
1764 cards
1.4 Network Security
OCR GCSE Computer Science
111 cards
OCR GCSE Psychology
2567 cards
OCR GCSE Sociology
1449 cards
OCR GCSE Physics
1329 cards