Network Security: Forms of Attacks Network Threats Securing a Network Expert Level - Check My Answers
Active Attack
A network attack where the hacker attempts to change data or introduce a malware.
Passive Attack
When a hacker monitors data travelling on a network (without changing the data).
Denial of Service Attack
A network attack which involves overloading a network with useless traffic to make the network slow or unresponsive.
Brute Force Attack
When a hacker or automated software generates thousands of usernames/passwords to try to access a computer system.
Insider Attack
A network attack performed by someone whithin the organisation, using their network access to steal or change information.
Malicious software created to damage or gain illegal access to a computer system. (e.g. Trojan Horse, virus, spyware etc.)
When someone sends an e-mail or text pretending to be a well-known business, asking the recipient to share their personal information (e.g account number, password).
Anti-malware software
Software designed to identify and remove malware and hence stop malware from damaging a computer network.
A network device used to prevent hackers from accessing a network.
User Access Levels
Are used to control which files or area of a network different groups of user can access.
Authentication using Strong Passwords
A method of identification of a user on a computer system (e.g. username and password, biometrics such as fingerprints).
When data is encoded (encrypted) and can only be decoded by computers with the correct decryption key.
Network forensics
Investigations undertaken by an organisation to find the cause and source of an attack on their network.
Penetration Testing
The process of simulating attacks on a network to identify weaknesses.
SQL Injection
Typing SQL code in an input box of a form to try to access or attack an SQL database.
Data Interception and Theft
The act of intercepting or stealing information from a computer system or from an electronic communication.
Social Engineering
A way of gaining sensitive information or illegal access to a computer system or network by influencing people (usually employees of an organisation).
Network Policies
A set of rules and procedures members of an organisation are asked to follow to ensure their network remain secure.