Save
...
compsci
network security
forms of attack
Save
Share
Learn
Content
Leaderboard
Share
Learn
Created by
Dion
Visit profile
Cards (15)
label
A)
active
B)
modify
C)
delete
D)
eavesdropping
E)
monitors
F)
information
G)
external
H)
internal
8
label
A)
malware
B)
social engineering
C)
brute force
D)
denial of service
E)
data interception
F)
sql injection
6
label
A)
software
B)
deleted
C)
corrupted
D)
slow
E)
crashing
F)
viruses
G)
embedded
H)
replicate
I)
deleting
J)
worms
K)
spread
L)
emails
M)
trojans
N)
legitimate
O)
email
P)
spyware
Q)
monitor
R)
passwords
S)
ransomware
T)
blackmail
U)
payment
V)
encrypt
22
label
A)
exploiting weaknesses
B)
phone calls
C)
details
D)
phishing
E)
emails
F)
company
G)
pretexting
H)
government
I)
human errors
J)
locking doors
K)
passwords
L)
encrypting
M)
up to date
13
label
A)
requests
B)
flood
C)
overload
D)
slow down
E)
ddos
F)
multiple
G)
customers
H)
money
I)
reputation
9
label
A)
structured query language
B)
create
C)
access
D)
manipulate
E)
database
F)
insert
G)
modify
H)
delete
8
label
A)
phishing
B)
emails
C)
genuine
D)
link
E)
brute force
F)
program
G)
password
H)
combinations
I)
denial of service
J)
performing
K)
bomboarding
L)
requests
M)
legitimate
N)
interception theft
O)
transmision
P)
packet
Q)
sniffer
R)
network
S)
internet
T)
sql
U)
data input
V)
errors
W)
unintended
X)
policy
Y)
security rules
Z)
adhere
[)
ignore
\)
accidentally
])
deliberately
^)
passwords
_)
viruses
31
label
A)
levels of access
B)
authorised
C)
external
D)
usb memory
E)
viruses
F)
secure passwords
G)
websites
H)
wirelessly
I)
backup
9
label
A)
penatration testing
B)
policies
C)
access levels
D)
secure
E)
encryption
F)
anti malware
G)
firewalls
7
label
A)
hack
B)
network
C)
databases
D)
vulnerable
E)
sql injection
F)
software
G)
viruses
H)
antivirus
I)
antispyware
J)
attachments
K)
files
L)
known
M)
updates
N)
database
14
label
A)
barrier
B)
network
C)
internet
D)
unwanted traffic
E)
filtering requests
F)
legitimate
G)
hardware
H)
software
I)
whole network
J)
individual devices
K)
hackers
L)
malware
M)
unauthorised access
N)
dos / ddos attack
O)
roles
P)
administrators
Q)
digital lock
R)
encrypted
S)
interception and theft
T)
physical
U)
sql injection
21
lbael
A)
monitoring
B)
traffic
C)
data packets
D)
analysis
E)
invasive
F)
where
6
label
A)
plain text
B)
ciphered
C)
private key
D)
public key
E)
information
5
;label
A)
locked
B)
biometrics
C)
surveillance
D)
interception and theft
E)
engineering
F)
anti malware
G)
firewalls
H)
encryption
I)
physical security
J)
access levels
K)
passwords
L)
physical security
M)
access levels
N)
passwords
O)
firewalls
P)
encryption
Q)
physical security
R)
penetration testing
S)
user access
T)
passwords
20
label
A)
anti malware
B)
scans for
C)
virus
D)
spyware
E)
malware
F)
database
G)
alerts
H)
deletes
I)
stops
J)
firewall
K)
traffic
L)
criteria
M)
unauthorised
N)
encryption
O)
scrambles
P)
understood
Q)
key
R)
user access levels
S)
accidental
T)
passwords
U)
biometrics
V)
strong
W)
unique
X)
brute force
Y)
lock
25
See similar decks
GCSE Biology
4243 cards
GCSE Physical Education
4412 cards
GCSE Chemistry
2586 cards
GCSE French
1307 cards
WJEC GCSE Chemistry
2012 cards
Edexcel GCSE Business
2657 cards
OCR GCSE History
605 cards
4.1.5 Network security:
Edexcel GCSE Computer Science > Topic 4: Networks > 4.1 Computer Networks
59 cards
AQA GCSE Physical Education
4119 cards
9.4 Network security
AQA A-Level Computer Science > 9.0 Fundamentals of communication and networking
161 cards
Understanding forms of attack
OCR GCSE Computer Science > 1.4 Network Security > 1.4.1 Threats to Computer Systems and Networks
33 cards
Edexcel GCSE History
1115 cards
OCR GCSE Geography
2028 cards
AQA GCSE German
1719 cards
Edexcel GCSE Biology
2635 cards
Edexcel GCSE French
2689 cards
OCR GCSE Business
1914 cards
OCR GCSE Biology
2284 cards
1.4 Network Security
OCR GCSE Computer Science
111 cards
AQA GCSE Business Studies
2228 cards
OCR GCSE Business Studies
1764 cards