system security

  • Created by: k.mucklow
  • Created on: 12-06-18 16:24
encryption is the use of
scrabbling messages to only be unscrambled with a key
1 of 26
keyword cipher
the word with form the first part of encryption with others being alphabetical
2 of 26
caesar cipher
changes the letters by turns of letters
3 of 26
number replacement
as it says
4 of 26
types of malware
virus, trojan horse and spyware
5 of 26
social engineering
phishing, shoulderin, pharming
6 of 26
types of attack
DDos, worm, brute force, blagging
7 of 26
packet sniffing
network management use it to detect errors in "packets" moving
8 of 26
how can packet sniffing be used for black hat
to pull out passwords and user names
9 of 26
SQL injection is
vulnerabilities of passwords like 1=1
10 of 26
SQL injection can be prevented by
the change on password code to keep all type in as a variable
11 of 26
white hat hacker
someone hired to use vulnerabilities and repair them in websites
12 of 26
black hat hacker
someone who hacks for their benefit
13 of 26
brown hat hacker
hacks for the benefit of others (anonymous)
14 of 26
network forensics
main use of packet sniffing to make sure operation is running normally
15 of 26
penetration testing
using people to hack to test your network vulnerability
16 of 26
anti malware software
detects out of place software to prevent it from digging into code
17 of 26
firewall
program put in place to stop unwanted code
18 of 26
user access level
amount that can be shown against people to allow what they can see
19 of 26
virus
can delete or corrupt data
20 of 26
trojan horse
disguised attack e.g nigerian prince dead
21 of 26
worms
uses holes to replicate nd slow down band width
22 of 26
spyware
designed to extract information
23 of 26
social engineering
uses fake sights or emails to get people on boared
24 of 26
DDOS
uses zombie computers to block other networks to collect information
25 of 26
brute force
guessing username and passwords
26 of 26

Other cards in this set

Card 2

Front

keyword cipher

Back

the word with form the first part of encryption with others being alphabetical

Card 3

Front

caesar cipher

Back

Preview of the front of card 3

Card 4

Front

number replacement

Back

Preview of the front of card 4

Card 5

Front

types of malware

Back

Preview of the front of card 5
View more cards

Comments

No comments have yet been made

Similar Computing resources:

See all Computing resources »See all Hardware resources »