|
|
Creado por Alex Cochrane
hace alrededor de 9 años
|
|
| Pregunta | Respuesta |
| Phishing | sending emails pretending to be from companies in order to induce people to reveal personal information, such as passwords and credit card numbers. |
| How to spot an Phishing email | Shoddy links Bad Grammar No logos |
| Shoulder surfing | Shouldering involves direct observation of a user entering their security details |
| Malware | Malicious software specifically designed to disrupt or damage a computer system. |
| Brute force attacks | Hacker may go through a list of different passwords until access to an account is gained. |
| Denial of service (DOS) attacks | attacker usually sends excessive messages asking the network or server to authenticate requests that have invalid return addresses. |
| Viruses | type of malware which is installed without your knowledge, with the purpose of doing harm. Infects (embeds itself in) other programs or data files |
| Worms | Standalone program that doesn’t need to attach itself to an existing program in order to spread It may scan the Internet looking for vulnerable computersto infect |
| Removable media | Criminals sometimes leave a USB stick contaminated with a virus lying, for example, in the car park of a company that they wish to infect with a virus or steal data from. 25% of malware is spread through USB storage devices |
| Eavesdropping | “Eavesdropping” is used to intercept data packets as they move across networks |
| SQL injection | database query language takes advantage of web input forms to access or destroy data |
| Penetration testing | ‘Pen’ testing is the practice of deliberately trying to find security holes in your own systems. |
| Black box testing | In black box testing, testers are given no more information than any potential hacker may have. |
| White box testing | white box testing, testers are given as much information as an ‘insider’ may have, in order to determine how much damage a rogue employee could do to a system. |
| Grey-hat hackers | Grey hats will frequently seek out system vulnerabilities without authorization from the system owners |
| Audit trails | Audit trails are useful for maintaining security and for recovering lost data |
| Network forensics | Similar to police forensics, network administrators can use audit trail data to solve data mysteries o This can identify data leaks and prevent security attacks o An intrusion detection system can and alert administrators in real-time |
| Network policies | Network security compromised by employee behavior, can be addressed with correct user policy |
| Proxy server | proxy server is a computer that acts as an intermediary between a web browser and the Internet |
| Functions of an operating system | -provision of a user interface -memory management -multitasking -disk/peripheral management -user management / security -file management |
| Utilities | -The operating system controls and manages the computer system -Utilities provide extra functionality that make it easier to use -They can be packaged as part of the operating system or bought as stand-alone software programs |
¿Quieres crear tus propias Fichas gratiscon GoConqr? Más información.