System security

?
What is malware?
This is software that is specifically designed to gain access or damage a computer without the knowledge of the owner. There are various types of malware including spyware, key loggers, true viruses.
1 of 7
What is phishing?
the fraudulent practice of sending emails purporting to be from reputable companies in order to induce individuals to reveal personal information, such as passwords and credit card numbers.
2 of 7
What is social engineering?
Social engineering is an attack vector that relies heavily on human interaction and often involves tricking people into breaking normal security procedures.
3 of 7
What is a brute force attack?
A brute force attack is a trial-and-error method used to obtain information such as a user password or personal identification number (PIN).
4 of 7
What is a denial of service attack?
In a DoS attack, the attacker usually sends excessive messages asking the network or server to authenticate requests that have invalid return addresses.
5 of 7
What is data interpretation and theft?
Interpretation is the process of making sense of numerical data that has been collected, analyzed, and presented.
6 of 7
What is the concept of SQL injection?
SQL Injection (SQLi) refers to an injection attack wherein an attacker can execute malicious SQL statements (also commonly referred to as a malicious payload) that control a web application's database server
7 of 7

Other cards in this set

Card 2

Front

What is phishing?

Back

the fraudulent practice of sending emails purporting to be from reputable companies in order to induce individuals to reveal personal information, such as passwords and credit card numbers.

Card 3

Front

What is social engineering?

Back

Preview of the front of card 3

Card 4

Front

What is a brute force attack?

Back

Preview of the front of card 4

Card 5

Front

What is a denial of service attack?

Back

Preview of the front of card 5
View more cards

Comments

No comments have yet been made

Similar Computing resources:

See all Computing resources »See all Computer systems resources »