Systems software L1 Network threats Quiz

Description

Systems software L1 Network threats Quiz
Sam Houghton
Flashcards by Sam Houghton, updated more than 1 year ago
Sam Houghton
Created by Sam Houghton almost 8 years ago
18
0

Resource summary

Question Answer
What is Phishing? A phishing email is one that tricks you into handing over sensitive or personal information (login details, bank details, etc.)
What is Shoulder surfing? Shouldering involves direct observation of a user entering their security details
What are Brute force attacks? (Passwords) In a brute force attack, a hacker may go through a list of different passwords until access to an account is gained Alternatively, the attacker may try every combination of characters until the correct password is found
Tips on Setting a secure password? You should never include your name, DOB or personal details Validation checks on a new password may specify that it must be: between 10 and 15 characters (length check) a mixture of numbers, lower and uppercase characters and symbols (format check) Change default passwords
What are Viruses? A computer virus is one type of malware (malicious software) which is installed without your knowledge, with the purpose of doing harm A virus is a program which infects (embeds itself in) other programs or data files It is easily spread if a user innocently sends an infected file to someone else
What are Worms? A worm is another type of malware It is a standalone program that does need to attach itself to an existing program in order to spread It may scan the Internet looking for vulnerable computers to infect
Dangers of USB sticks? Criminals sometimes leave a USB stick contaminated with a virus lying, for example, in the car park of a company that they wish to infect with a virus or steal data from
How can you minimize the risk of Viruses on Removable media? Scan all devices, never use a found device and disable the autorun facility for removable media
What is Eavesdropping? “Eavesdropping” is used to intercept data packets as they move across networks Packets are inspected for useful data that could be misused or sold
What is Digital stalking? Hackers can use your mobile device to access detailed information about your daily life While you browse Facebook on your smartphone, someone could be tracking your every move, determining your GPS coordinates, the direction you are walking in and how fast you’re walking
Ideas to Protect your mobile phone? Use the password feature and choose a strong password Do not follow links in suspicious emails Think carefully before posting your mobile phone number on public websites Don’t install apps without researching them first – if they require extra permissions, don’t install them Delete all information stored on your mobile before discarding
What is a Denial of Service attack? A DoS attack attempts to flood a website server with an overwhelming number of data requests It may flood the victim’s site with spam emails (an “email bomb”) or disrupt access to a victim’s website or entire geographical area by reconfiguring software to crash network sites
What is SQL injection? SQL is a database query language SQL injection takes advantage of web input forms to access or destroy data SQL commands can be input into web forms instead of the expected ‘real’ data This can be interpreted by vulnerable web applications as an additional instruction to operate in the hacker’s favour
What is An Acceptable Use Policy ? An Acceptable Use Policy details strict guidelines about what is and is not acceptable behaviour on a network All employees or students should be asked to read and sign this
Show full summary Hide full summary

Similar

Types and Components of Computer Systems
Jess Peason
A level Computing Quiz
Zacchaeus Snape
Input Devices
Jess Peason
Output Devices
Jess Peason
Software Processes
Nurul Aiman Abdu
Computing
Kwame Oteng-Adusei
Translations and transformations of functions
Christine Laurich
System Analysis
R A
Software testing strategies: Summary
harrymt
Software Application
Dim Ah