Save
Computer science
Network Security threats
Save
Share
Learn
Content
Leaderboard
Share
Learn
Created by
Burak
Visit profile
Cards (100)
What are networks great for?
They
provide
many
benefits.
View source
Why should network security threats be taken seriously?
Hackers can inflict
significant
harm
.
View source
How do hackers conduct passive attacks?
Using
network-monitoring
hardware and software.
View source
What is lawful interception?
Data interception for
cybersecurity
by agencies.
View source
What is an active attack?
Attacking a network with
malware
or planned attacks.
View source
What is an insider attack?
Exploiting
network access
from within an organization.
View source
What is a brute force attack?
Cracking
passwords
through trial and error.
View source
What measures can reduce the risk of brute force attacks?
Locking
accounts
after
failed attempts
and using
strong passwords
.
View source
What is a denial-of-service attack (DoS)?
Stopping users from accessing a
network
or website.
View source
How do most DoS attacks work?
By flooding the
network
with useless traffic.
View source
What is malware?
Software that can harm
devices
.
View source
How is malware typically installed?
Without the user's
knowledge
or consent.
View source
What are typical actions of malware?
Deleting files,
scareware
, locking files,
spyware
,
rootkits
, and opening
backdoors
.
View source
What is scareware?
Software
that scares users into following
links
.
View source
What is spyware?
Software
that secretly monitors user actions.
View source
What are rootkits?
Malware
that alters
permissions
for access.
View source
How do viruses spread?
By attaching to certain
files
and user
actions
.
View source
What are common reasons for security threats in organizations?
Neglecting to
encrypt
data
Using
bad code
Hackers manipulating
employees
View source
How do social engineers typically operate?
By
pretending
to be someone within the
organization
.
View source
What is phishing?
Sending
fraudulent
emails to obtain personal information.
View source
How do phishing emails typically work?
They request users to update
personal information
.
View source
What is the goal of phishing attacks?
To access users' genuine
accounts
.
View source
What features help reduce phishing emails?
Anti-phishing
features in email programs and browsers.
View source
What should users do with suspicious emails?
Treat them with
caution
.
View source
How can companies prevent social engineering attacks?
Educating
employees
on
risks
Training on what to look out for
View source
What are SQL injections?
Pieces of
SQL
typed into
input
boxes.
View source
What does SQL stand for?
Structured Query Language
.
View source
How do SQL injections exploit websites?
By revealing
sensitive information
through
weak validation
.
View source
What does "1=1" signify in SQL injections?
It is always
true
, revealing all
data.
View source
What do organizations want to prevent regarding their network?
Vulnerabilities
View source
Why do organizations follow a set of rules and procedures?
To ensure their
network
is protected
View source
What should organizations regularly test on their network?
Security weaknesses
View source
What is the purpose of using passwords in network security?
To prevent
unauthorized
access
View source
What is the role of anti-malware software in network security?
To prevent
malicious
software attacks
View source
What is penetration testing?
Simulating potential attacks on the
network
View source
What does penetration testing help identify?
Possible weaknesses in
network security
View source
What is the result of penetration testing?
Reported
vulnerabilities
View source
What is the purpose of user access levels?
To control access to
network parts
View source
What is the role of encryption in network security?
To protect
sensitive data
View source
How does encryption help in data security?
By making data unreadable to
unauthorized
users
View source
See all 100 cards