Network Security

Cards (22)

  • active attack
    A network attack where the hacker attempts to change data or introduce malware,
  • backdoor
    A Vulnerability in a Computer or network's security that a hacker could exploit.
  • brute force attack.
    A network attack which uses software to Crack security passwords through trial and error.
  • denial-of-service attack.

    A network attack which stops users from accessing a part of a network or website.
  • insider attacks
    A network attack where someone within an organisation exploits their network access to steal information.
  • Lawful interception
    Checking data on a network for Cyber security purposes.
  • malware
    Malicious software created to damage or gain illegal access to computer systems.
  • network forensics
    Investigations that organisations undertake to find the cause of attacks on their network.
  • network policy.
    A set of rules and procedures an organisation will follow to ensure their network is protected against attacks.
  • network security
    Protection against network attacks.
  • passive attack
    Where a hacker monitors data travelling on a network,
  • pentesting (penetration testing)

    The process of simulating attacks on a network to identify weaknesses.
  • phishing
    When criminals send emails or texts to someone claiming to be a Well-known business.
  • ransomware
    A type of malware that uses encryption to lock a user out of their files.
  • scareware
    A type of malware that creates false messages to trick the user into following malicious links.
  • social engineering
    A Way of gaining illegal access to data or networks by influencing people.
  • spoof website
    A fake website that tricks users into thinking it's another well known Website.
  • spyware
    A type of malware which secretly monitors and records user actions.
  • SQL injection.
    A piece of SQL code which can be typed into an input box to try and attack the SQL database,
  • trojans
    A type of malware which is disguised as legitimate software,
  • virus
    A type of malware which spreads by attaching itself to files.
  • worm
    A type of malware which replicates itself.