Computer Science OCR 9-1 // Network Security Threats

?
  • Created by: Jyro
  • Created on: 09-12-18 16:08
What is a passive attack?
Where someone monitors data travelling on a network and intercepts any sensitive information they find
1 of 16
What is an active attack?
When someone attacks a network with malware or other planned attacks
2 of 16
What is the best defence against a passive attack?
Data Encryption
3 of 16
What is an insider attack?
When someone within an organisation exploits their network access to steal information
4 of 16
What is a brute force attack?
A type of attack used to gain information by cracking passwrods through trial and error
5 of 16
What is a denial-of-service attack? (DoS)
Where a hacker tries to stop users form accessing a part of a network or website. Most DoS attacks involve flooding the netwokr with useless traffic, making the network extremely slow or completely inaccessible
6 of 16
What is Malware?
Malicious Software. Installed onto someone's device without their knowledge or consent
7 of 16
What is Phishing?
When criminals send emails or texts to people claiming to be from a well-known company. They request that the user update their personal information.The information is then handed over to the criminals, who can then access their account
8 of 16
What techniques are used to prevent network security attacks?
Penetration Testing, Network Forensics, Passwords, User Access Levels, Anti-Malware Software, Encryption
9 of 16
What is Penetration Testing?
When organisations employ specialists to simulate potential attacks on their network so possible weaknesses can be identified
10 of 16
What is Network Forensics?
Investigations undertaken to find the cause of attacks on a network so any weaknesses can be fixed
11 of 16
What is the purpose of Passwords?
Help to prevent unauthorised users accessing the network
12 of 16
What are User Access Levels and why are they used?
User Access Levels control which part of the network different groups of users can access. They help limit the number of people with access to important data, so help prevent insider attacks on the networks
13 of 16
What is the purpose of Anti-Malware Software?
Designed to find and stop malware from damaging an organisation's network and the devices on it
14 of 16
What is the purpose of a Firewall?
Firewalls examine all data entering and leaving the network and block any potential threats
15 of 16
What is the purpose of Encryption?
To translate data into a code which only with the correct key can access and read, meaning unauthorised users cannot read it
16 of 16

Other cards in this set

Card 2

Front

What is an active attack?

Back

When someone attacks a network with malware or other planned attacks

Card 3

Front

What is the best defence against a passive attack?

Back

Preview of the front of card 3

Card 4

Front

What is an insider attack?

Back

Preview of the front of card 4

Card 5

Front

What is a brute force attack?

Back

Preview of the front of card 5
View more cards

Comments

No comments have yet been made

Similar ICT resources:

See all ICT resources »See all Networks resources »