• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/18

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

18 Cards in this Set

  • Front
  • Back

What is hacking?

An attempt to get around computer security system to access data or information.

What are some reasons for hacking?

- Theft


- Ethical


- Fun


- Mallace

What are some forms of attack?

- Brute Force


- Denial Of Service


- Data interception (Man in middle)


- SQL injection


- Phishing


- Malware

What are some different forms of malware and their definitions?

Trojan (Malicious programs you're tricked into downloading)


Spyware (Gathers information about the user and sends it to the originator)


Virus (A program hidden in another program that reproduces itself, causing damage)


Worm (Program replicates itself and spreads through a network


Backdoor (Allows outsiders to bypass security checks)


Route kit (modifies the OS to avoid detection)


Ransomware (Encrypts data and holds it to ransom.)

Name some protection against malware.

- Up to date anti-malware software, operating system and browser.


- Turn off images on emails


- Don't open unknown emails


- Avoid peer to peer

What is phishing and how can you protect yourself against it?

A common strategy for obtaining sensitive information, usually bank or account details.

Don't open links from unknown emails.

What is a brute force attack and how can you protect yourself against it?

Trying to identify a password by trial and error.


Strong passwords

What is a DOS and how can you protect yourself against it?

An attempt to make a system unusable by flooding it with requests, so that your malware goes undetected.


Captcha's or other "real person" computer programs.

What is data interception and theft and how can you protect yourself against it?

Network data is intercepted by packet sniffing.


Strong encryption data and network monitoring.

What is SQL injection and how can you protect yourself against it?

Entering SQL queries into online forms to change the database SQL queries.


Suitable validation of forms.

What is network policy?

A set of guidelines set by network managers to maintain safe working practices.

What is penetration testing?

Involves setting up various attacks on a network to identify a vulnerability.

What is anti-malware software?

Software that scans for malware.

What is a firewall?

Firewalls control what data goes in and out. They inspect each packet for certain characteristics and make a decision based on sender IP and protocols used on whether to allow the data in.

What are user access levels?

Users are given different access to parts of the system depending on their needs.

What is a password and what is good password practice?

The first line of defence to prevent unauthorised access.


It should use a mix of lowercase, uppercase, numbers and characters and should be changed regularly.

What is encryption?

Scrambling the data to prevent and outsider making use of the data even if they gain access.

What is used to encrypt and decrypt data?

An encryption key.