Network Security threats

Cards (100)

  • What are networks great for?
    They provide many benefits.
  • Why should network security threats be taken seriously?
    Hackers can inflict significant harm.
  • How do hackers conduct passive attacks?
    Using network-monitoring hardware and software.
  • What is lawful interception?
    Data interception for cybersecurity by agencies.
  • What is an active attack?
    Attacking a network with malware or planned attacks.
  • What is an insider attack?
    Exploiting network access from within an organization.
  • What is a brute force attack?
    Cracking passwords through trial and error.
  • What measures can reduce the risk of brute force attacks?
    Locking accounts after failed attempts and using strong passwords.
  • What is a denial-of-service attack (DoS)?
    Stopping users from accessing a network or website.
  • How do most DoS attacks work?
    By flooding the network with useless traffic.
  • What is malware?
    Software that can harm devices.
  • How is malware typically installed?
    Without the user's knowledge or consent.
  • What are typical actions of malware?
    Deleting files, scareware, locking files, spyware, rootkits, and opening backdoors.
  • What is scareware?
    Software that scares users into following links.
  • What is spyware?
    Software that secretly monitors user actions.
  • What are rootkits?
    Malware that alters permissions for access.
  • How do viruses spread?
    By attaching to certain files and user actions.
  • What are common reasons for security threats in organizations?
    • Neglecting to encrypt data
    • Using bad code
    • Hackers manipulating employees
  • How do social engineers typically operate?
    By pretending to be someone within the organization.
  • What is phishing?
    Sending fraudulent emails to obtain personal information.
  • How do phishing emails typically work?
    They request users to update personal information.
  • What is the goal of phishing attacks?
    To access users' genuine accounts.
  • What features help reduce phishing emails?
    Anti-phishing features in email programs and browsers.
  • What should users do with suspicious emails?
    Treat them with caution.
  • How can companies prevent social engineering attacks?
    • Educating employees on risks
    • Training on what to look out for
  • What are SQL injections?
    Pieces of SQL typed into input boxes.
  • What does SQL stand for?
    Structured Query Language.
  • How do SQL injections exploit websites?
    By revealing sensitive information through weak validation.
  • What does "1=1" signify in SQL injections?
    It is always true, revealing all data.
  • What do organizations want to prevent regarding their network?
    Vulnerabilities
  • Why do organizations follow a set of rules and procedures?
    To ensure their network is protected
  • What should organizations regularly test on their network?
    Security weaknesses
  • What is the purpose of using passwords in network security?
    To prevent unauthorized access
  • What is the role of anti-malware software in network security?
    To prevent malicious software attacks
  • What is penetration testing?
    Simulating potential attacks on the network
  • What does penetration testing help identify?
    Possible weaknesses in network security
  • What is the result of penetration testing?
    Reported vulnerabilities
  • What is the purpose of user access levels?
    To control access to network parts
  • What is the role of encryption in network security?
    To protect sensitive data
  • How does encryption help in data security?
    By making data unreadable to unauthorized users