Name 5 ways which a network can be attacked? - Passive attacks; active attacks; insider attack; brute force attack; denial-of-service attack, Explain a DoS attack - This is when the hacker tries to stop the user accessing a part of the network or website. They usually involve trying to flood the websites with traffic requests., Describe a passive attack? - This is when the hacker uses a piece of software called a packet sniffer, they monitor the data travelling along a network and intercept it. They can almost sit undetected listening to your data transmissions., List six malicious ways malicious software may carry-out - maliciously deleting and modifying files; scareware-declares the software broken and click here to fix; ransomware- this locks files and demands payment before unlocking. Spyware- monitors keyboard presses; rootkits- this alters permissions giving hackers administrator rights., Provide 3 ways that malicious software can get access to a network - Viruses; worms and Trojans, What is a trojan? - This is a piece of malicious software that is made to look like a genuine piece of software, it doesn't replicate itself but may send you to a bank account page that is a spoof website, so you enter your banking details into it., What is the key difference between a worm and a virus? - A worm can self-replicate and therefore spreads very easily eg through self-generated malicious emails ; a virus needs to attach to a file, it can only be spread when that file is executed or opened., Provide ways in which social engineering is used to defraud. - A customer may receive a phone call about their account details need updating etc; Phishing- emails may claim to be from your bank and you provide details that allows the fraudsters to clear out your accounts., Explain how SQL injection works. - If there is insufficient protection (validation) on the website hackers can enter specific commands in the input boxes and actually access all the data stored on the databases, this could reveal very sensitive information., What main features will a good network policy have? - Regularly testing the network to look for weaknesses (penetration testing); use and enforcement of strong passwords that are regularly changed; installation of anti-malware; A firewall to prevent external attacks; good encryption of data., Explain what penetration testing is. - Tests that are designed to find weaknesses in a network, they simulate potential attacks and try to exploit the system, the results are feedback and acted upon., What considerations should you take into account with regards to your password? - They should be long and contain a mixture of characters; special characters and numbers. The best passwords won't be found in a dictionary., What is firewall and what is its job? - This is a piece of software or hardware that looks at all data transmissions, it unpacks the packet and makes sure there is nothing malicious in the payload, or suspicious in the addresses. It blocks any potential threats. It can even stop users accessing the internet by blocking certain ports i.e. port 80 block internet traffic., What type of attacks do user access rights stop - Insider attacks, What is an encryption key? - This is a unique code of random binary sequences that is used to jumble up a message. The encrypted data is usually a bitwise XOR of the data and the key, meaning that the original cannot be retrieved unless you have access to the key that was used to encrypt it ., What is encrypted text called? - Cipher text, Why is encryption used? - This prevents hackers from being able to translate intercepted packets of data into something useful they could then use to attack your data-self, eg bank details.,

排行榜

翻轉卡片是一個開放式範本。它不會為排行榜生成分數。

視覺風格

選項

切換範本

恢復自動保存: ?