Save
computer science
networks
network security threats
Save
Share
Learn
Content
Leaderboard
Share
Learn
Created by
Khalisa
Visit profile
Cards (68)
What are the two main types of network attacks?
Passive
and
active
attacks
View source
What is a passive attack?
Monitoring data to
intercept
sensitive information
View source
How are passive attacks detected?
They are hard to
detect
View source
What is the best defense against passive attacks?
Data encryption
View source
What is lawful interception?
Data interception for
cybersecurity
by government
View source
What is an active attack?
Attacking a network with
malware
or planned attacks
View source
What is the main defense against active attacks?
A
firewall
View source
What is an insider attack?
Exploiting
network access
to steal information
View source
What is a brute force attack?
Cracking
passwords
through trial and error
View source
What can reduce the risk of a brute force attack?
Locking accounts after
failed attempts
View source
How do brute force attacks operate?
Using
automated software
for password combinations
View source
What is a
denial-of-service
attack
(
DoS
)?
Stopping users from accessing a network or website
View source
How do most DoS attacks work?
Flooding the
network
with useless traffic
View source
What is malware?
Software that can harm
devices
View source
How is malware typically installed?
Without the user's
knowledge
or consent
View source
What are common actions performed by malware?
Deleting files,
scareware
, locking files
View source
What is scareware?
Software
that scares users into action
View source
What is ransomware?
Malware
that
encrypts
files for ransom
View source
What is spyware?
Monitors user actions and sends info to
hackers
View source
What do rootkits do?
Alter permissions for
administrator-level
access
View source
What are backdoors in malware?
Holes in security for
future
attacks
View source
How do viruses spread?
By attaching to certain
files
View source
What are worms in the context of malware?
Self-replicating malware that spreads quickly
View source
What are Trojans?
Malware
disguised as
legitimate
software
View source
What is social engineering?
Gaining
access
by influencing people
View source
How does social engineering commonly occur?
Through
phone calls
pretending to be
someone else
View source
How do phishing emails typically operate?
They link to
spoofed
websites requesting
personal info
View source
What is phishing?
Sending
fraudulent
emails to steal information
View source
What is the purpose of anti-phishing features?
To reduce the number of
phishing
emails
received
View source
What should users do with suspicious emails?
Treat them with
caution
View source
How can companies prevent social engineering attacks?
By educating
employees
on risks
View source
What is SQL injection?
Inserting
SQL
code
to
access
sensitive
data
View source
How do SQL injections exploit websites?
By
entering
SQL code into
input
boxes
View source
What does SQL stand for?
Structured Query Language
View source
What happens if SQL code lacks strong validation?
It can be exploited to access
unauthorized
data
View source
What is the result of a poorly validated SQL query?
It may reveal sensitive information from the
database
View source
What is penetration testing (pentesting)?
Simulating attacks to identify
network weaknesses
View source
What does physical security protect?
The physical parts of a
network
View source
What are some examples of physical security measures?
Locks,
surveillance equipment
, and
passcodes
View source
What is the purpose of passwords?
To prevent
unauthorized
access to the
network
View source
See all 68 cards