system security 0.0 / 5 ? ComputingHardwareGCSEAll boards Created by: k.mucklowCreated on: 12-06-18 16:24 encryption is the use of scrabbling messages to only be unscrambled with a key 1 of 26 keyword cipher the word with form the first part of encryption with others being alphabetical 2 of 26 caesar cipher changes the letters by turns of letters 3 of 26 number replacement as it says 4 of 26 types of malware virus, trojan horse and spyware 5 of 26 social engineering phishing, shoulderin, pharming 6 of 26 types of attack DDos, worm, brute force, blagging 7 of 26 packet sniffing network management use it to detect errors in "packets" moving 8 of 26 how can packet sniffing be used for black hat to pull out passwords and user names 9 of 26 SQL injection is vulnerabilities of passwords like 1=1 10 of 26 SQL injection can be prevented by the change on password code to keep all type in as a variable 11 of 26 white hat hacker someone hired to use vulnerabilities and repair them in websites 12 of 26 black hat hacker someone who hacks for their benefit 13 of 26 brown hat hacker hacks for the benefit of others (anonymous) 14 of 26 network forensics main use of packet sniffing to make sure operation is running normally 15 of 26 penetration testing using people to hack to test your network vulnerability 16 of 26 anti malware software detects out of place software to prevent it from digging into code 17 of 26 firewall program put in place to stop unwanted code 18 of 26 user access level amount that can be shown against people to allow what they can see 19 of 26 virus can delete or corrupt data 20 of 26 trojan horse disguised attack e.g nigerian prince dead 21 of 26 worms uses holes to replicate nd slow down band width 22 of 26 spyware designed to extract information 23 of 26 social engineering uses fake sights or emails to get people on boared 24 of 26 DDOS uses zombie computers to block other networks to collect information 25 of 26 brute force guessing username and passwords 26 of 26
Comments
No comments have yet been made