Save
...
compsci
network security
forms of attack
Save
Share
Learn
Content
Leaderboard
Share
Learn
Created by
Dion
Visit profile
Cards (15)
label
A)
active
B)
modify
C)
delete
D)
eavesdropping
E)
monitors
F)
information
G)
external
H)
internal
8
label
A)
malware
B)
social engineering
C)
brute force
D)
denial of service
E)
data interception
F)
sql injection
6
label
A)
software
B)
deleted
C)
corrupted
D)
slow
E)
crashing
F)
viruses
G)
embedded
H)
replicate
I)
deleting
J)
worms
K)
spread
L)
emails
M)
trojans
N)
legitimate
O)
email
P)
spyware
Q)
monitor
R)
passwords
S)
ransomware
T)
blackmail
U)
payment
V)
encrypt
22
label
A)
exploiting weaknesses
B)
phone calls
C)
details
D)
phishing
E)
emails
F)
company
G)
pretexting
H)
government
I)
human errors
J)
locking doors
K)
passwords
L)
encrypting
M)
up to date
13
label
A)
requests
B)
flood
C)
overload
D)
slow down
E)
ddos
F)
multiple
G)
customers
H)
money
I)
reputation
9
label
A)
structured query language
B)
create
C)
access
D)
manipulate
E)
database
F)
insert
G)
modify
H)
delete
8
label
A)
phishing
B)
emails
C)
genuine
D)
link
E)
brute force
F)
program
G)
password
H)
combinations
I)
denial of service
J)
performing
K)
bomboarding
L)
requests
M)
legitimate
N)
interception theft
O)
transmision
P)
packet
Q)
sniffer
R)
network
S)
internet
T)
sql
U)
data input
V)
errors
W)
unintended
X)
policy
Y)
security rules
Z)
adhere
[)
ignore
\)
accidentally
])
deliberately
^)
passwords
_)
viruses
31
label
A)
levels of access
B)
authorised
C)
external
D)
usb memory
E)
viruses
F)
secure passwords
G)
websites
H)
wirelessly
I)
backup
9
label
A)
penatration testing
B)
policies
C)
access levels
D)
secure
E)
encryption
F)
anti malware
G)
firewalls
7
label
A)
hack
B)
network
C)
databases
D)
vulnerable
E)
sql injection
F)
software
G)
viruses
H)
antivirus
I)
antispyware
J)
attachments
K)
files
L)
known
M)
updates
N)
database
14
label
A)
barrier
B)
network
C)
internet
D)
unwanted traffic
E)
filtering requests
F)
legitimate
G)
hardware
H)
software
I)
whole network
J)
individual devices
K)
hackers
L)
malware
M)
unauthorised access
N)
dos / ddos attack
O)
roles
P)
administrators
Q)
digital lock
R)
encrypted
S)
interception and theft
T)
physical
U)
sql injection
21
lbael
A)
monitoring
B)
traffic
C)
data packets
D)
analysis
E)
invasive
F)
where
6
label
A)
plain text
B)
ciphered
C)
private key
D)
public key
E)
information
5
;label
A)
locked
B)
biometrics
C)
surveillance
D)
interception and theft
E)
engineering
F)
anti malware
G)
firewalls
H)
encryption
I)
physical security
J)
access levels
K)
passwords
L)
physical security
M)
access levels
N)
passwords
O)
firewalls
P)
encryption
Q)
physical security
R)
penetration testing
S)
user access
T)
passwords
20
label
A)
anti malware
B)
scans for
C)
virus
D)
spyware
E)
malware
F)
database
G)
alerts
H)
deletes
I)
stops
J)
firewall
K)
traffic
L)
criteria
M)
unauthorised
N)
encryption
O)
scrambles
P)
understood
Q)
key
R)
user access levels
S)
accidental
T)
passwords
U)
biometrics
V)
strong
W)
unique
X)
brute force
Y)
lock
25
See similar decks
Understanding forms of attack
OCR GCSE Computer Science > 1.4 Network Security > 1.4.1 Threats to Computer Systems and Networks
33 cards
GCSE Physical Education
4412 cards
GCSE Biology
4243 cards
9.4 Network security
AQA A-Level Computer Science > 9.0 Fundamentals of communication and networking
161 cards
AQA GCSE Physical Education
4119 cards
4.1.5 Network security:
Edexcel GCSE Computer Science > Topic 4: Networks > 4.1 Computer Networks
59 cards
3.5.5 Network security
AQA GCSE Computer Science > 3.5 Fundamentals of computer networks
23 cards
Edexcel GCSE History
1115 cards
AQA GCSE German
1719 cards
OCR GCSE Geography
2028 cards
Edexcel GCSE Business
2657 cards
WJEC GCSE Chemistry
2012 cards
OCR GCSE History
605 cards
AQA GCSE Criminology
731 cards
GCSE Chemistry
2586 cards
GCSE French
1307 cards
1.4 Network Security
OCR GCSE Computer Science
111 cards
GCSE Physics
3155 cards
GCSE Mathematics
1419 cards
AQA GCSE History
1635 cards
AQA GCSE Spanish
998 cards