1.6 system security

?
  • Created by: 11618
  • Created on: 01-04-19 09:31
Malware
Viruses are a form of malware. A virus is a program that is installed on a computer without your knowledge or permission with the purpose of doing harm.
1 of 17
Phishing
Phishing is an attempt to steal information through use of a fake email or website pretending to be legitimate company or organisation.
2 of 17
Brute force attack
Refers to an attack that goes through different passwords or letters until access to an account is eventually gained.
3 of 17
Denial of service attack
An attempt to prevent legitimate users from accessing a website by flooding a network with useless spam or traffic.
4 of 17
Data interception attack
Gaining unauthorised access by shouldering a user entering a PIN or password, accessing paper documents thrown away into rubbish bins or accessing data on a computer left logged on by users who have left the room.
5 of 17
SQL injection
A technique that exploits security weaknesses in a website. It achieves this by inserting malicious SQL code into database field on a website
6 of 17
Poor network policy
Some security problems can be attributed to poor network policy. Employees should be given strict guidelines about what is and is not acceptable behaviour in a relation to information technology.
7 of 17
Penetration testing
Used to find any security weaknesses in a system.
8 of 17
Internal penetration test
An internal penetration test puts the tester in the position of an employee with standard access rights to determine how much damage they could choose to cause.
9 of 17
External penetration test
An external penetration test could target email servers, web servers or firewalls - the objective is to find whether a hacker could get in.
10 of 17
Network forensics
Capturing, storing and analysing network events. Used by network managers to keep a network secure.
11 of 17
Network policies
An Acceptable Use Policy makes it clear to all network users what is acceptable and what is not.
12 of 17
Anti-malware software
Protects a computer in 3 ways: 1. Prevents harmful software from being installed. 2. Prevents important files from being changed or deleted. 3. If a virus is installed, the software will detect during scan.
13 of 17
Firewalls
Designed to prevent unauthorised access to or from a private network or intranet. All messages entering or leaving pass through the firewall and those which do not meet specified security criteria are blocked.
14 of 17
User access levels
Set for disks, folders and files so users can only access what they need to.
15 of 17
Password
The easiest way to stop unauthorised access to a computer or certain files.
16 of 17
1.6 System security
1.6 System security
17 of 17

Other cards in this set

Card 2

Front

Phishing

Back

Phishing is an attempt to steal information through use of a fake email or website pretending to be legitimate company or organisation.

Card 3

Front

Brute force attack

Back

Preview of the front of card 3

Card 4

Front

Denial of service attack

Back

Preview of the front of card 4

Card 5

Front

Data interception attack

Back

Preview of the front of card 5
View more cards

Comments

No comments have yet been made

Similar Computing resources:

See all Computing resources »See all The Internet resources »