System Security

?
Passive attack
When someone monitors data travelling on a network and intercepts sensitive information
1 of 19
Active attack
When someone attacks a network with malware or other planned attacks
2 of 19
Insider Attack
When someone within an organisation exploits their network access to steal data
3 of 19
Malware
Malicious software installed on a device without the owners knowledge or consent
4 of 19
Phishing
When criminals send texts or emails to people claiming to be a well-known business
5 of 19
Social Engineering
A way of gaining sensitive information or illegal access to a network by influencing people - usually employees
6 of 19
Brute Force Attack
A type of attack used to gain information by cracking passwords through trial and error
7 of 19
Denial of Service Attack
When a hacker tries to stop users accessing a website or part of a network, usually by flooding it with useless traffic
8 of 19
Data Interception and Theft
The unauthorised taking or interception of data from an unknowing victim with the intent of compromising privacy or obtaining confidential information
9 of 19
SQL Injection
Pieces of SQL typed into a website's input box which then reveals sensitive information
10 of 19
Network Policy
A set of rules and procedures the organisation will follow to ensure their network is protected against attacks and unauthorised access
11 of 19
Security Vulnerability
An unintended flaw in a system or software code that leaves it open to the potential of exploitation
12 of 19
Penetration Testing
When organisations employ specialists to stimulate potential attacks on their network
13 of 19
Network Forensics
Investigations undertaken to find the cause of attacks on a network
14 of 19
Anti-malware Software
Software designed to find and stop malware from damaging an organisation’s network and the devices on it
15 of 19
Firewall
Firewalls block unauthorised access by examining all data entering and leaving the network and block any potential threats
16 of 19
User Access Levels
User access levels control which parts of the network different groups of users can access so they help limit the amount of people with access to important data which helps prevent insider attacks
17 of 19
Passwords
Passwords help prevent unauthorised users accessing the network
18 of 19
Encryption
When data is translated into a code which only someone with the correct key can access
19 of 19

Other cards in this set

Card 2

Front

When someone attacks a network with malware or other planned attacks

Back

Active attack

Card 3

Front

When someone within an organisation exploits their network access to steal data

Back

Preview of the back of card 3

Card 4

Front

Malicious software installed on a device without the owners knowledge or consent

Back

Preview of the back of card 4

Card 5

Front

When criminals send texts or emails to people claiming to be a well-known business

Back

Preview of the back of card 5
View more cards

Comments

No comments have yet been made

Similar Computing resources:

See all Computing resources »See all Security resources »