System security

?
  • Created by: SumedhaR
  • Created on: 24-10-19 18:05
What is a passive attack?
where someone monitors data travelling on a network and intercepts any sensitive information by using network hardware and software such as packet sniffers
1 of 21
How to defend against a passive attack?
Data encryption
2 of 21
active attack
Attack with malware or other planned attacks
3 of 21
Defence against an active attack
Firewall
4 of 21
Insider attack
some inside an organisation exploits network access they have
5 of 21
brute force attack
Active attack, Cracking passwords through trial and error using real words and predictable number sequences
6 of 21
Dos
Stopping users from accessing a part of a network or a website by flooding the network with useless traffic
7 of 21
What is malware
Software that can harm devices
8 of 21
Typical actions of malware
* deleting or modifying files, scareware, locking files, spyware, rootkits, opening backdoors
9 of 21
Rootkits
Alter permissions giving malware and hackers adminstrator level acces to devices
10 of 21
Opening backdoors
Holes in the security which can be used for future attacks
11 of 21
3 types of malware
Viruses, Worms, Trojan
12 of 21
How do viruses work
Attach to a file and infect by copying themselves, they activate by users opening infected files
13 of 21
How do worms work
Self-replicate and don't need user help, they exploit weaknesses in network security i
14 of 21
Trojans
Malware disguised as legitimate software, don't replicate themselves they need to be installed
15 of 21
Social engineering
Gaining access and sensitive information by influencing people (employees of large companies)
16 of 21
Types of social engineering
Telephone and phishing
17 of 21
What is phishing?
Sending emails/texts claiming to be from a legitimate business; containing links to spoof versions of websites asking for user information
18 of 21
SQL
pieces of sql typed into a websites input box which then reveals sensitive information
19 of 21
Network policies
set of rules and procedures that an organisation follow to ensure that thei network is protected against attacs and unauthorised access
20 of 21
What are the components of a good network policy
regular network testing to identify security weaknesses and fix them, use passwords, enforce user access to limit no. of people access to sensitive information,anti-malware and firewall software, data encryption
21 of 21

Other cards in this set

Card 2

Front

Data encryption

Back

How to defend against a passive attack?

Card 3

Front

Attack with malware or other planned attacks

Back

Preview of the back of card 3

Card 4

Front

Firewall

Back

Preview of the back of card 4

Card 5

Front

some inside an organisation exploits network access they have

Back

Preview of the back of card 5
View more cards

Comments

No comments have yet been made

Similar Computing resources:

See all Computing resources »See all System security resources »