Save
...
9.0 Fundamentals of communication and networking
9.4 Network security
9.4.1 Threats
Save
Share
Learn
Content
Leaderboard
Share
Learn
Cards (77)
What does network security protect in computer networks?
Integrity, confidentiality, accessibility
Preventing unauthorized access is a key goal of
network security
.
Data breaches can result in financial losses and reputational
damage
Match the network threat with its description:
Malware ↔️ Malicious software that can damage systems
Phishing ↔️ Fraudulent emails to trick users
DDoS ↔️ Overwhelming a network with traffic
Unauthorized access ↔️ Gaining entry without permission
Malware is malicious software designed to harm or disable computer
systems
A DDoS attack overwhelms a
network
with traffic to disrupt services.
What is the primary prevention measure against malware?
Use antivirus software
Protecting against cyber attacks is a key goal of
network security
.
Email filters are used to prevent
phishing
attacks.
Match the network threat with its prevention measure:
Malware ↔️ Antivirus software
Phishing ↔️ Email filters
DDoS ↔️ Intrusion detection systems
Unauthorized access ↔️ Multi-factor authentication
What is the purpose of malware?
Harm or disable systems
Worms propagate across networks, causing system
overload
What is ransomware designed to do?
Encrypt user's data
Phishing attacks use
social engineering
to trick users.
Steps in a phishing attack
1️⃣ Send a fraudulent email
2️⃣ User clicks a malicious link
3️⃣ User reveals sensitive information
4️⃣ Information is used for malicious purposes
What is email phishing?
Fake emails from legitimate sources
Spear phishing is a targeted phishing attack on specific
individuals
Smishing is a
phishing
attack conducted via SMS or text messages.
What is the main characteristic of spear phishing?
Targeted on specific individuals
Match the phishing method with its prevention measure:
Email Phishing ↔️ Educate users
Spear Phishing ↔️ Verify sender information
Smishing ↔️ Be cautious with links in texts
What is email phishing?
Fake emails that appear legitimate
Spear phishing is targeted phishing on specific
individuals
How does smishing occur?
Phishing via SMS or text messages
Phishing uses
social engineering
to trick users into revealing sensitive information.
Common methods of phishing attacks
1️⃣ Email phishing
2️⃣ Spear phishing
3️⃣ Smishing
Spear phishing prevention measures include verifying sender information and using multi-factor
authentication
What is an example of a phishing email scenario?
A bank email asking to verify account details
Match the phishing method with its prevention measure:
Email Phishing ↔️ Educate users
Spear Phishing ↔️ Verify sender information
Smishing ↔️ Be cautious with links
What are three common network threats alongside phishing?
Malware, DDoS, unauthorized access
Network security aims to protect the integrity,
confidentiality
, and accessibility of computer networks.
One importance of network security is preventing unauthorized
access
What types of cyber attacks does network security protect against?
Malware, phishing, DDoS
Reasons why network security is important
1️⃣ Prevent unauthorized access
2️⃣ Protect against cyber attacks
3️⃣ Minimize data breach risks
4️⃣ Ensure business continuity
What is malware?
Malicious software to harm systems
Malware prevention measures include using antivirus software, firewalls, and regular system
updates
Phishing involves fraudulent emails or
websites
that trick users into revealing personal information.
What does a DDoS attack aim to achieve?
Disrupt services with excessive traffic
Match the malware type with its description:
Virus ↔️ Attaches to files, replicates when executed
Worm ↔️ Self-replicating programs across networks
Trojan ↔️ Disguises as legitimate software
Ransomware ↔️ Encrypts data, demands payment
What is an example of a spear phishing scenario?
Personalized emails targeting specific groups
DoS attacks involve a single attacker, while DDoS attacks use multiple coordinated
attackers
See all 77 cards