Where someone monitors data travelling on a network and intercepts any sensitive information they find
1 of 16
What is an active attack?
When someone attacks a network with malware or other planned attacks
2 of 16
What is the best defence against a passive attack?
Data Encryption
3 of 16
What is an insider attack?
When someone within an organisation exploits their network access to steal information
4 of 16
What is a brute force attack?
A type of attack used to gain information by cracking passwrods through trial and error
5 of 16
What is a denial-of-service attack? (DoS)
Where a hacker tries to stop users form accessing a part of a network or website. Most DoS attacks involve flooding the netwokr with useless traffic, making the network extremely slow or completely inaccessible
6 of 16
What is Malware?
Malicious Software. Installed onto someone's device without their knowledge or consent
7 of 16
What is Phishing?
When criminals send emails or texts to people claiming to be from a well-known company. They request that the user update their personal information.The information is then handed over to the criminals, who can then access their account
8 of 16
What techniques are used to prevent network security attacks?
When organisations employ specialists to simulate potential attacks on their network so possible weaknesses can be identified
10 of 16
What is Network Forensics?
Investigations undertaken to find the cause of attacks on a network so any weaknesses can be fixed
11 of 16
What is the purpose of Passwords?
Help to prevent unauthorised users accessing the network
12 of 16
What are User Access Levels and why are they used?
User Access Levels control which part of the network different groups of users can access. They help limit the number of people with access to important data, so help prevent insider attacks on the networks
13 of 16
What is the purpose of Anti-Malware Software?
Designed to find and stop malware from damaging an organisation's network and the devices on it
14 of 16
What is the purpose of a Firewall?
Firewalls examine all data entering and leaving the network and block any potential threats
15 of 16
What is the purpose of Encryption?
To translate data into a code which only with the correct key can access and read, meaning unauthorised users cannot read it
16 of 16
Other cards in this set
Card 2
Front
What is an active attack?
Back
When someone attacks a network with malware or other planned attacks
Card 3
Front
What is the best defence against a passive attack?
Comments
No comments have yet been made