Save
gcse ocr computing
1.4 network security
Save
Share
Learn
Content
Leaderboard
Share
Learn
Created by
abigail
Visit profile
Cards (27)
What are the two main forms of attack in network security?
Active
and
Passive
View source
What is an active attack?
An attempt to
modify
or
delete
data
View source
What is a passive attack?
An attempt to
retrieve
information without changes
View source
What is an internal attack?
An attack by someone inside the
organization
View source
What is an external attack?
An attack by someone outside the
organization
View source
What are the qualities of a strong password?
At least eight
characters
Include
upper
and
lower
case
Include
special
characters
Include
numbers
Does not include a
name
Does not contain a complete word
Relates to an
acronym
View source
What is a virus in terms of malware?
Malicious software hiding within another
application
View source
How do worms differ from viruses?
Worms
replicate
through a
network
independently
View source
What are Trojans in malware?
Programs pretending to be
legitimate
but are malware
View source
What is spyware?
Monitors
user
activities and sends information back
View source
What is ransomware?
Blackmails users into making a
payment
View source
What are the types of malware?
Viruses
Worms
Trojans
Spyware
Ransomware
View source
What is social engineering in network security?
Tricking users into giving out information
View source
What is a brute force attack?
Trial and error to find the correct
password
View source
What is a denial of service (DOS) attack?
Overloads
a
computer
or
network
with
traffic
View source
What is data interception and theft?
Looking at data traveling over a
network
View source
What is SQL injection?
Entering SQL code to modify
database
data
View source
What is malware?
Malicious
software designed to cause harm
View source
What are methods for identifying and preventing vulnerabilities?
Penetration testing
User
access levels
Secure passwords
Encryption
Anti-
malware software
Firewalls
Physical security
View source
What is penetration testing?
Scanning for
security weaknesses
in a network
View source
What are user access levels?
Controls which parts of a
system
users can access
View source
Why are secure passwords important?
They defend against
brute force attacks
View source
What is encryption?
Translating data into
code
for security
View source
What is anti-malware software?
Prevents and
removes malware
from systems
View source
What is the function of firewalls?
Monitors and controls
network traffic
View source
What is physical security?
Controls access to important
hardware
View source
What are some examples of physical security measures?
Security guards
, locks,
CCTV
,
swipe cards
View source