Created by Alex Cochrane
almost 8 years ago
|
||
Question | Answer |
Phishing | sending emails pretending to be from companies in order to induce people to reveal personal information, such as passwords and credit card numbers. |
How to spot an Phishing email | Shoddy links Bad Grammar No logos |
Shoulder surfing | Shouldering involves direct observation of a user entering their security details |
Malware | Malicious software specifically designed to disrupt or damage a computer system. |
Brute force attacks | Hacker may go through a list of different passwords until access to an account is gained. |
Denial of service (DOS) attacks | attacker usually sends excessive messages asking the network or server to authenticate requests that have invalid return addresses. |
Viruses | type of malware which is installed without your knowledge, with the purpose of doing harm. Infects (embeds itself in) other programs or data files |
Worms | Standalone program that doesn’t need to attach itself to an existing program in order to spread It may scan the Internet looking for vulnerable computersto infect |
Removable media | Criminals sometimes leave a USB stick contaminated with a virus lying, for example, in the car park of a company that they wish to infect with a virus or steal data from. 25% of malware is spread through USB storage devices |
Eavesdropping | “Eavesdropping” is used to intercept data packets as they move across networks |
SQL injection | database query language takes advantage of web input forms to access or destroy data |
Penetration testing | ‘Pen’ testing is the practice of deliberately trying to find security holes in your own systems. |
Black box testing | In black box testing, testers are given no more information than any potential hacker may have. |
White box testing | white box testing, testers are given as much information as an ‘insider’ may have, in order to determine how much damage a rogue employee could do to a system. |
Grey-hat hackers | Grey hats will frequently seek out system vulnerabilities without authorization from the system owners |
Audit trails | Audit trails are useful for maintaining security and for recovering lost data |
Network forensics | Similar to police forensics, network administrators can use audit trail data to solve data mysteries o This can identify data leaks and prevent security attacks o An intrusion detection system can and alert administrators in real-time |
Network policies | Network security compromised by employee behavior, can be addressed with correct user policy |
Proxy server | proxy server is a computer that acts as an intermediary between a web browser and the Internet |
Functions of an operating system | -provision of a user interface -memory management -multitasking -disk/peripheral management -user management / security -file management |
Utilities | -The operating system controls and manages the computer system -Utilities provide extra functionality that make it easier to use -They can be packaged as part of the operating system or bought as stand-alone software programs |
Want to create your own Flashcards for free with GoConqr? Learn more.