Systems security

Malware
Software that is designed to disrupt or harm a user`s computer
1 of 10
Phishing
Sending emails pretending to be a reputable company to try to gain people`s personal information
2 of 10
Spear Phishing
Targeted contextualized Phishing
3 of 10
Smishing
Phishing via text message
4 of 10
Social Engineering
Tricking people into breaking security procedures to break into a network
5 of 10
Brute Force Attack
This hacking is where they throw everything at it. They try every possibility to crack the details and when they do they win
6 of 10
Denial-of-Service(DoS)
This type is designed to flood a network with useless network traffic. This is often a threat that is carried out on a web server to 'take down' a website
7 of 10
Data interception and theft
This is where data packets are monitored that are travelling to look for packets that contain personal data
8 of 10
SQL injection
SQL is used to search through a database looking for information
9 of 10
Poor Network Policy
A network may be under threat if an organisation has a poor network policy. If an organisation does not regally test their network for security issues and loopholes, they may find one can be exploited before it is found.
10 of 10

Other cards in this set

Card 2

Front

Sending emails pretending to be a reputable company to try to gain people`s personal information

Back

Phishing

Card 3

Front

Targeted contextualized Phishing

Back

Preview of the back of card 3

Card 4

Front

Phishing via text message

Back

Preview of the back of card 4

Card 5

Front

Tricking people into breaking security procedures to break into a network

Back

Preview of the back of card 5
View more cards

Comments

No comments have yet been made

Similar Computing resources:

See all Computing resources »See all Systems security resources »