network security threats

Cards (68)

  • What are the two main types of network attacks?
    Passive and active attacks
  • What is a passive attack?
    Monitoring data to intercept sensitive information
  • How are passive attacks detected?
    They are hard to detect
  • What is the best defense against passive attacks?
    Data encryption
  • What is lawful interception?
    Data interception for cybersecurity by government
  • What is an active attack?
    Attacking a network with malware or planned attacks
  • What is the main defense against active attacks?
    A firewall
  • What is an insider attack?
    Exploiting network access to steal information
  • What is a brute force attack?
    Cracking passwords through trial and error
  • What can reduce the risk of a brute force attack?
    Locking accounts after failed attempts
  • How do brute force attacks operate?
    Using automated software for password combinations
  • What is a denial-of-service attack (DoS)?

    Stopping users from accessing a network or website
  • How do most DoS attacks work?
    Flooding the network with useless traffic
  • What is malware?
    Software that can harm devices
  • How is malware typically installed?
    Without the user's knowledge or consent
  • What are common actions performed by malware?
    Deleting files, scareware, locking files
  • What is scareware?
    Software that scares users into action
  • What is ransomware?
    Malware that encrypts files for ransom
  • What is spyware?
    Monitors user actions and sends info to hackers
  • What do rootkits do?
    Alter permissions for administrator-level access
  • What are backdoors in malware?
    Holes in security for future attacks
  • How do viruses spread?
    By attaching to certain files
  • What are worms in the context of malware?
    Self-replicating malware that spreads quickly
  • What are Trojans?
    Malware disguised as legitimate software
  • What is social engineering?
    Gaining access by influencing people
  • How does social engineering commonly occur?
    Through phone calls pretending to be someone else
  • How do phishing emails typically operate?
    They link to spoofed websites requesting personal info
  • What is phishing?
    Sending fraudulent emails to steal information
  • What is the purpose of anti-phishing features?
    To reduce the number of phishing emails received
  • What should users do with suspicious emails?
    Treat them with caution
  • How can companies prevent social engineering attacks?
    By educating employees on risks
  • What is SQL injection?
    Inserting SQL code to access sensitive data
  • How do SQL injections exploit websites?
    By entering SQL code into input boxes
  • What does SQL stand for?
    Structured Query Language
  • What happens if SQL code lacks strong validation?
    It can be exploited to access unauthorized data
  • What is the result of a poorly validated SQL query?
    It may reveal sensitive information from the database
  • What is penetration testing (pentesting)?
    Simulating attacks to identify network weaknesses
  • What does physical security protect?
    The physical parts of a network
  • What are some examples of physical security measures?
    Locks, surveillance equipment, and passcodes
  • What is the purpose of passwords?
    To prevent unauthorized access to the network