System Security

?
Software which can be damaging to a computer or network and is also known as malicious software
Malware
1 of 22
Malware that attaches itself to programmes or files on a computer or server
Virus
2 of 22
It is designed to access a computer by misleading users
Trojan Horse
3 of 22
It replicates itself in order to spread to other computers
Worm
4 of 22
It is designed to acquire sensitive information
Phishing
5 of 22
It outlines rules for network access
Network Policy
6 of 22
A trial and error method that consists of an attacker trying possible passwords until the correct one is found
Brute Force Attack
7 of 22
When a group of infected computers overloads a website with unwanted traffic
DDOS
8 of 22
Where an attacker can execute SQL statements using software which controls a database management system
SQL Injection
9 of 22
A group of computers being controlled by an attacker without the users knowledge
Botnet
10 of 22
The examination of data sent across a network
Network Forensics
11 of 22
Interception of packets across a network
Packet Sniffing
12 of 22
When someone checks for current vulnerabilities and weaknesses so they can't be exploited maliciously
Penetration Testing
13 of 22
The person who checks for vulnerabilities and weaknesses to they can't be exploited maliciously
Penetration Tester
14 of 22
Software that aims to prevent malicious software from getting into a computer or network
Anti malware software
15 of 22
Software that acts as a barrier between an attacker and copmuter but isn't 100% effective
Firewall
16 of 22
How many characters are needed at least for a secure password
Eight
17 of 22
They allow an administrator to set up a hierachy of users
User Access Levels
18 of 22
A string of letters, numbers and symbols used to gain access to a service
Passwords
19 of 22
Things that can be used in addition to a password
Biometrics
20 of 22
When data is translated into code so only users with a key can decrypt it
Encryption
21 of 22
A method of encryption by moving every letter left by a certain amount of places
Caesar Cipher
22 of 22

Other cards in this set

Card 2

Front

Malware that attaches itself to programmes or files on a computer or server

Back

Virus

Card 3

Front

It is designed to access a computer by misleading users

Back

Preview of the front of card 3

Card 4

Front

It replicates itself in order to spread to other computers

Back

Preview of the front of card 4

Card 5

Front

It is designed to acquire sensitive information

Back

Preview of the front of card 5
View more cards

Comments

No comments have yet been made

Similar Computing resources:

See all Computing resources »See all System Security resources »