Cards (77)

  • What does network security protect in computer networks?
    Integrity, confidentiality, accessibility
  • Preventing unauthorized access is a key goal of network security.
  • Data breaches can result in financial losses and reputational damage
  • Match the network threat with its description:
    Malware ↔️ Malicious software that can damage systems
    Phishing ↔️ Fraudulent emails to trick users
    DDoS ↔️ Overwhelming a network with traffic
    Unauthorized access ↔️ Gaining entry without permission
  • Malware is malicious software designed to harm or disable computer systems
  • A DDoS attack overwhelms a network with traffic to disrupt services.
  • What is the primary prevention measure against malware?
    Use antivirus software
  • Protecting against cyber attacks is a key goal of network security.
  • Email filters are used to prevent phishing attacks.
  • Match the network threat with its prevention measure:
    Malware ↔️ Antivirus software
    Phishing ↔️ Email filters
    DDoS ↔️ Intrusion detection systems
    Unauthorized access ↔️ Multi-factor authentication
  • What is the purpose of malware?
    Harm or disable systems
  • Worms propagate across networks, causing system overload
  • What is ransomware designed to do?
    Encrypt user's data
  • Phishing attacks use social engineering to trick users.
  • Steps in a phishing attack
    1️⃣ Send a fraudulent email
    2️⃣ User clicks a malicious link
    3️⃣ User reveals sensitive information
    4️⃣ Information is used for malicious purposes
  • What is email phishing?
    Fake emails from legitimate sources
  • Spear phishing is a targeted phishing attack on specific individuals
  • Smishing is a phishing attack conducted via SMS or text messages.
  • What is the main characteristic of spear phishing?
    Targeted on specific individuals
  • Match the phishing method with its prevention measure:
    Email Phishing ↔️ Educate users
    Spear Phishing ↔️ Verify sender information
    Smishing ↔️ Be cautious with links in texts
  • What is email phishing?
    Fake emails that appear legitimate
  • Spear phishing is targeted phishing on specific individuals
  • How does smishing occur?
    Phishing via SMS or text messages
  • Phishing uses social engineering to trick users into revealing sensitive information.
  • Common methods of phishing attacks
    1️⃣ Email phishing
    2️⃣ Spear phishing
    3️⃣ Smishing
  • Spear phishing prevention measures include verifying sender information and using multi-factor authentication
  • What is an example of a phishing email scenario?
    A bank email asking to verify account details
  • Match the phishing method with its prevention measure:
    Email Phishing ↔️ Educate users
    Spear Phishing ↔️ Verify sender information
    Smishing ↔️ Be cautious with links
  • What are three common network threats alongside phishing?
    Malware, DDoS, unauthorized access
  • Network security aims to protect the integrity, confidentiality, and accessibility of computer networks.
  • One importance of network security is preventing unauthorized access
  • What types of cyber attacks does network security protect against?
    Malware, phishing, DDoS
  • Reasons why network security is important
    1️⃣ Prevent unauthorized access
    2️⃣ Protect against cyber attacks
    3️⃣ Minimize data breach risks
    4️⃣ Ensure business continuity
  • What is malware?
    Malicious software to harm systems
  • Malware prevention measures include using antivirus software, firewalls, and regular system updates
  • Phishing involves fraudulent emails or websites that trick users into revealing personal information.
  • What does a DDoS attack aim to achieve?
    Disrupt services with excessive traffic
  • Match the malware type with its description:
    Virus ↔️ Attaches to files, replicates when executed
    Worm ↔️ Self-replicating programs across networks
    Trojan ↔️ Disguises as legitimate software
    Ransomware ↔️ Encrypts data, demands payment
  • What is an example of a spear phishing scenario?
    Personalized emails targeting specific groups
  • DoS attacks involve a single attacker, while DDoS attacks use multiple coordinated attackers