Explore

Network Attacks Flashcards
OCR GCSE J277 Computer Science specification
Ready to master these flashcards?
Sign in to study with spaced repetition and track your progress.
Sign In to Track ProgressTerms in this set (10)
Malware
Malicious software designed to harm or exploit systems, including viruses, worms, and ransomware.
Social Engineering
Manipulating individuals into revealing confidential information or performing actions that compromise security.
Phishing
Fraudulent messages designed to trick users into revealing sensitive information, such as passwords or financial details.
Brute-force Attack
A method of trying many passwords or combinations to gain unauthorised access to a system.
Denial of Service (DoS) Attack
Overloading a system or network with traffic to make it unavailable to users.
Data Interception/Theft
The act of capturing or stealing data as it is transmitted over a network.
SQL Injection
A technique where malicious SQL code is inserted into a database query to manipulate or access data.
Penetration Testing
Authorised probing of a system to identify vulnerabilities and improve security.
Encryption
The process of encoding data to protect it from unauthorised access during transmission or storage.
Firewall
A security system that filters incoming and outgoing network traffic based on predetermined rules.

Want to Learn More?
Get personalised lessons, quizzes, and instant feedback from your AI tutor.
Start Learning