SystemSecuritySoftware

Description

Network threats
Alex Cochrane
Flashcards by Alex Cochrane, updated more than 1 year ago
Alex Cochrane
Created by Alex Cochrane almost 8 years ago
4
0

Resource summary

Question Answer
Phishing sending emails pretending to be from companies in order to induce people to reveal personal information, such as passwords and credit card numbers.
How to spot an Phishing email Shoddy links Bad Grammar No logos
Shoulder surfing Shouldering involves direct observation of a user entering their security details
Malware Malicious software specifically designed to disrupt or damage a computer system.
Brute force attacks Hacker may go through a list of different passwords until access to an account is gained.
Denial of service (DOS) attacks attacker usually sends excessive messages asking the network or server to authenticate requests that have invalid return addresses.
Viruses type of malware which is installed without your knowledge, with the purpose of doing harm. Infects (embeds itself in) other programs or data files
Worms Standalone program that doesn’t need to attach itself to an existing program in order to spread It may scan the Internet looking for vulnerable computers to infect
Removable media Criminals sometimes leave a USB stick contaminated with a virus lying, for example, in the car park of a company that they wish to infect with a virus or steal data from. 25% of malware is spread through USB storage devices
Eavesdropping “Eavesdropping” is used to intercept data packets as they move across networks
SQL injection database query language takes advantage of web input forms to access or destroy data
Penetration testing ‘Pen’ testing is the practice of deliberately trying to find security holes in your own systems.
Black box testing In black box testing, testers are given no more information than any potential hacker may have.
White box testing white box testing, testers are given as much information as an ‘insider’ may have, in order to determine how much damage a rogue employee could do to a system.
Grey-hat hackers Grey hats will frequently seek out system vulnerabilities without authorization from the system owners
Audit trails Audit trails are useful for maintaining security and for recovering lost data
Network forensics Similar to police forensics, network administrators can use audit trail data to solve data mysteries o This can identify data leaks and prevent security attacks o An intrusion detection system can and alert administrators in real-time
Network policies Network security compromised by employee behavior, can be addressed with correct user policy
Proxy server proxy server is a computer that acts as an intermediary between a web browser and the Internet
Functions of an operating system -provision of a user interface -memory management -multitasking -disk/peripheral management -user management / security -file management
Utilities -The operating system controls and manages the computer system -Utilities provide extra functionality that make it easier to use -They can be packaged as part of the operating system or bought as stand-alone software programs
Show full summary Hide full summary

Similar

A level Computing Quiz
Zacchaeus Snape
Types and Components of Computer Systems
Jess Peason
Input Devices
Jess Peason
Output Devices
Jess Peason
Computing
Kwame Oteng-Adusei
Pack of playing cards answer
Karl Taylor
Code Challenge Flow Chart
Charlotte Hilton
Computing Hardware - CPU and Memory
ollietablet123
Computer Systems
lisawinkler10
Computer science quiz
Ryan Barton
Input, output and storage devices
Mr A Esch