system security

  • Created by: k.mucklow
  • Created on: 12-06-18 16:24
encryption is the use of
scrabbling messages to only be unscrambled with a key
1 of 26
keyword cipher
the word with form the first part of encryption with others being alphabetical
2 of 26
caesar cipher
changes the letters by turns of letters
3 of 26
number replacement
as it says
4 of 26
types of malware
virus, trojan horse and spyware
5 of 26
social engineering
phishing, shoulderin, pharming
6 of 26
types of attack
DDos, worm, brute force, blagging
7 of 26
packet sniffing
network management use it to detect errors in "packets" moving
8 of 26
how can packet sniffing be used for black hat
to pull out passwords and user names
9 of 26
SQL injection is
vulnerabilities of passwords like 1=1
10 of 26
SQL injection can be prevented by
the change on password code to keep all type in as a variable
11 of 26
white hat hacker
someone hired to use vulnerabilities and repair them in websites
12 of 26
black hat hacker
someone who hacks for their benefit
13 of 26
brown hat hacker
hacks for the benefit of others (anonymous)
14 of 26
network forensics
main use of packet sniffing to make sure operation is running normally
15 of 26
penetration testing
using people to hack to test your network vulnerability
16 of 26
anti malware software
detects out of place software to prevent it from digging into code
17 of 26
program put in place to stop unwanted code
18 of 26
user access level
amount that can be shown against people to allow what they can see
19 of 26
can delete or corrupt data
20 of 26
trojan horse
disguised attack e.g nigerian prince dead
21 of 26
uses holes to replicate nd slow down band width
22 of 26
designed to extract information
23 of 26
social engineering
uses fake sights or emails to get people on boared
24 of 26
uses zombie computers to block other networks to collect information
25 of 26
brute force
guessing username and passwords
26 of 26

Other cards in this set

Card 2


keyword cipher


the word with form the first part of encryption with others being alphabetical

Card 3


caesar cipher


Preview of the front of card 3

Card 4


number replacement


Preview of the front of card 4

Card 5


types of malware


Preview of the front of card 5
View more cards


No comments have yet been made

Similar Computing resources:

See all Computing resources »See all Hardware resources »