System Security 0.0 / 5 ? ComputingSystem SecurityGCSEOCR Created by: PollyMunroCreated on: 05-02-18 14:10 Software which can be damaging to a computer or network and is also known as malicious software Malware 1 of 22 Malware that attaches itself to programmes or files on a computer or server Virus 2 of 22 It is designed to access a computer by misleading users Trojan Horse 3 of 22 It replicates itself in order to spread to other computers Worm 4 of 22 It is designed to acquire sensitive information Phishing 5 of 22 It outlines rules for network access Network Policy 6 of 22 A trial and error method that consists of an attacker trying possible passwords until the correct one is found Brute Force Attack 7 of 22 When a group of infected computers overloads a website with unwanted traffic DDOS 8 of 22 Where an attacker can execute SQL statements using software which controls a database management system SQL Injection 9 of 22 A group of computers being controlled by an attacker without the users knowledge Botnet 10 of 22 The examination of data sent across a network Network Forensics 11 of 22 Interception of packets across a network Packet Sniffing 12 of 22 When someone checks for current vulnerabilities and weaknesses so they can't be exploited maliciously Penetration Testing 13 of 22 The person who checks for vulnerabilities and weaknesses to they can't be exploited maliciously Penetration Tester 14 of 22 Software that aims to prevent malicious software from getting into a computer or network Anti malware software 15 of 22 Software that acts as a barrier between an attacker and copmuter but isn't 100% effective Firewall 16 of 22 How many characters are needed at least for a secure password Eight 17 of 22 They allow an administrator to set up a hierachy of users User Access Levels 18 of 22 A string of letters, numbers and symbols used to gain access to a service Passwords 19 of 22 Things that can be used in addition to a password Biometrics 20 of 22 When data is translated into code so only users with a key can decrypt it Encryption 21 of 22 A method of encryption by moving every letter left by a certain amount of places Caesar Cipher 22 of 22
Comments
No comments have yet been made