Threats (System Security)

?
  • Created by: l2revisy
  • Created on: 15-12-21 14:19
Malware
Malware is malicious software that is designed to hack a system. Malware can take many different forms.
1 of 8
Phishing
Emails that try to trick users into giving away personal details. The phishing email pretends to be a genuine message and tries to deceive the user into following a link to a website that looks like the real company, for example, a bank.
2 of 8
Brute Force Attacks
Where a program is used to find a password by trying all possible combinations of characters until the correct one is obtained.
3 of 8
Denial Of Service (DOS)
Where a computer (or many computers) is used to prevent a server from performing its tasks. This is done by bombarding the server over and over again with requests. Eventually the server is tied up trying to handle all the DOS requests.
4 of 8
Data Interception and Theft
Where data is intercepted during transmission. This is done using software called a packet sniffer, which examines data packets as they are sent around a network, or across the internet. The information gathered is sent back to a hacker.
5 of 8
Structured Query Language (SQL) Injection
Where SQL code is entered as a data input. Many databases use SQL code to interrogate the data and maintain the structure. SQL code can be inputted as data, which can cause errors or unintended operations.
6 of 8
Poor Network Policy
Where a network does not have security rules in place for users to follow.
7 of 8
People As A Weak Point
Where users do not adhere to network policy. People frequently ignore rules, or accidentally or deliberately break them. For example, many users choose easy to guess passwords, or send and receive personal emails which may contain viruses.
8 of 8

Other cards in this set

Card 2

Front

Emails that try to trick users into giving away personal details. The phishing email pretends to be a genuine message and tries to deceive the user into following a link to a website that looks like the real company, for example, a bank.

Back

Phishing

Card 3

Front

Where a program is used to find a password by trying all possible combinations of characters until the correct one is obtained.

Back

Preview of the back of card 3

Card 4

Front

Where a computer (or many computers) is used to prevent a server from performing its tasks. This is done by bombarding the server over and over again with requests. Eventually the server is tied up trying to handle all the DOS requests.

Back

Preview of the back of card 4

Card 5

Front

Where data is intercepted during transmission. This is done using software called a packet sniffer, which examines data packets as they are sent around a network, or across the internet. The information gathered is sent back to a hacker.

Back

Preview of the back of card 5
View more cards

Comments

No comments have yet been made

Similar Computing resources:

See all Computing resources »See all Networks resources »