preventing network threats

HideShow resource information
Why would you update you OS to prevent malware ?
So that any possible loopholes can be updated and removed so that illegitimate files / data cannot enter your computer
1 of 10
What are 3 other ways you can prevent malware entering your computer ?
Don’t click on links you do not know the destination or or download files from someone you think is illegitimate , Be careful with email attachments & links , Regularly used anti-virus software to detect and remove malware
2 of 10
Why should you slow down when replying to a dodgy or illegitimate email?
So you can look at what you are submitting or opening before you do it and you can check for grammatical errors which are common for fake emails.
3 of 10
What else can you do to prevent phishing ?
Don't reply directly to suspicious emails and beware of illegitimate links or emails
4 of 10
What can you do to prevent Brute force attacks ?
Have a password that is strong and contains at least 8 letters and around 16 characters , also use numbers , upper and lower case and symbols like !"£$
5 of 10
What could you use instead of a password to prevent a brute force attack ?
A passphrase , one sentence with a mix of upper and lower case letters
6 of 10
Why would data encryption be good when trying to prevent data interception ?
So that if the data is intercepted it won't mean anything to the hackers and only the person with the correct key , the receiver , can decode the message
7 of 10
What else could you do to prevent data interception ?
Use anti-malware to recognise if any data is changed or deleted and use a firewall to deny any unauthorised people access to your personal data
8 of 10
Why is coding your data securely a good thing to do when preventing an SQL injection ?
So any characters that aren’t specific to the context of the data are rejected
9 of 10
What else could you do to prevent an SQL injection ?
Use a web application firewall . Its SQL injection defences can catch most attempts to sneak SQL through web channels , Validate the information properly before the SQL request is sent
10 of 10

Other cards in this set

Card 2

Front

What are 3 other ways you can prevent malware entering your computer ?

Back

Don’t click on links you do not know the destination or or download files from someone you think is illegitimate , Be careful with email attachments & links , Regularly used anti-virus software to detect and remove malware

Card 3

Front

Why should you slow down when replying to a dodgy or illegitimate email?

Back

Preview of the front of card 3

Card 4

Front

What else can you do to prevent phishing ?

Back

Preview of the front of card 4

Card 5

Front

What can you do to prevent Brute force attacks ?

Back

Preview of the front of card 5
View more cards

Comments

No comments have yet been made

Similar Computing resources:

See all Computing resources »See all Networks resources »