Save
GCSE
Computing Paper 1
Network Security
Save
Share
Learn
Content
Leaderboard
Learn
Created by
Shannon Jacob
Visit profile
Cards (29)
Forms of attack include:
malware
social
engineering /
phising
brute
force attacks
denial of
service
attacks
data
interception
and theft
SQL
injection
malware
is a type of harmful program that can
damage
or gain
unauthorised
access to your computer
types of malware:
virus
worm
trojan
spyware
keylogger
ransomware
a virus can
replicate
and
spread
itself and is only activated when
opened
by a
human
a worm can
replicate
itself and spreads by finding
weaknesses
in the software
worms can spread very
quickly
and doesn't need human
interaction
to spread
trojan
is harmful program that look
legitimate
so users are
tricked
into installing it
spyware
secretly records the activities of a user. it records usernames,
passwords
and
credit
card information
keylogger secretly records a users
key presses
and records usernames,
passwords
, and
credit card
details
ransomware
locks
files using
encryption
so that the user cant
access
them
ransomware
attackers demand
money
from the victim to
decrypt
their data
SQL
is a programming language that
manipulates
data in databases
SQL
injection
can trick the website into giving
unauthorised
access to the database
SQL injection
can be used to view and edit a
database
denial
of service attack is when the hacker
repeatedly
sends
requests
to a server to
slow
it down
brute force attack tries every possible
combination
of
passwords
until one is found
social
engineering is when hackers
trick
users into revealing their
personal
data by pretending to be a
trusted
company
data
interception is when data
packets
is copied to a
different
location
packet sniffers
is software that
intercepts
and
analyses
data packets
prevention methods:
penetration
testing
anti malware
software
firewalls
user access levels
passwords
encryption
physical
security
penetration
testing is used to deliberately hack a system to find any
risks
or
weaknesses
anti
malware
software locates and
deletes
malware from a
computer
system
anti
malware also checks all
emails
coming in and out
anti malware
checks files and
scans
the
hard drive
for viruses
a
firewall
manages
incoming
and
outgoing
network traffic
a
firewall
checks each data
packet
to check whether it should be given
access.
secure
passwords
minimises the chances of
unauthorised
users in a system
user
access
levels allow certain users to access and
edit
files
encryption
is the process of
scrambling
data that can only be understood with a
key