← Back to Dashboard

1.4 Network Security

GCSE Computer Science (J277)

Fill in the blanks with the correct words. Click "Check Answer" to see if you're right!

Term: Brute force attack

Definition:

A method of systematically trying all usernames and passwords to gain unauthorised .
No attempts
Term: Data interception and theft

Definition:

Data being read by an user or program
No attempts
Term: Virus/malware

Definition:

Software that / damages data or allows unauthorised access. Can / spread.
No attempts
Term: Denial of service attack

Definition:

Flooding a with so much traffic it is unable to requests.
No attempts
Term: Phishing

Definition:

Fake sent to a person. Person into giving away personal data.
No attempts
Term: Social engineering

Definition:

The use of to trick individuals into giving away or personal information
No attempts
Term: SQL injection

Definition:

A hacking technique used to view or data in a database by inserting code instead of data into a text box on a form
No attempts
Term: Trojan

Definition:

Malware as legitimate software. Once installed acts as a and may delete or damage data
No attempts
Term: worm

Definition:

Software that across a using up all the bandwidth
No attempts
Term: Ransomware

Definition:

Locks to data. Owners have to a fee to regain access to it.
No attempts
Term: Physical threat

Definition:

Any non-software threat to a computer and the on it such as a person physically or stealing a server.
No attempts
Term: Network forensics

Definition:

Prevents data by identifying activity on a network
No attempts
Term: Firewall

Definition:

Prevents access to a network by scanning incoming and outgoing packets of data for suspicious content. Also helps prevent and force attacks.
No attempts
Term: Anti-malware

Definition:

Prevents malware such as and spyware by files on a computer or being downloaded and quarantining or deleting suspicious files.
No attempts
Term: Penetration testing

Definition:

Prevents unauthorised access to a network such as a brute force attack or injection by testing for vulnerabilities so they can be made
No attempts
Term: Encryption

Definition:

Prevents data by making the data . Only those with the decryption key can read the data.
No attempts
Term: Physical security

Definition:

Prevents access by physical methods such as , keycard entry, biometric entry to , alarms and security .
No attempts
Term: Strong passwords

Definition:

Prevents unauthorised access by making passwords difficult to or brute attack.
No attempts
Term: User access levels

Definition:

Prevents unauthorised access to on a network by setting strict read/write that limit what a user can access and prevents accidental changes.
No attempts
Term: 2-factor authentication

Definition:

Prevents unauthorised access by adding an layer of security to the procedure by sending a to a separate device. Makes a brute force attack impossible.
No attempts
Term: Education and training

Definition:

Prevents threats to a network by making users behave in an way when using a network. Examples such as identifying emails and not visiting suspicious websites.
No attempts