Thanks to visit codestin.com
Credit goes to www.scribd.com

0% found this document useful (0 votes)
121 views1 page

1.4.1 System Security - Answers - BrainQuest

The document provides information about system threats and threat preventions. It includes a table of system threats like spyware, phishing, and denial of service attacks along with their descriptions. It also includes a table of threat preventions such as penetration testing, firewalls, and encryption along with brief descriptions of each.

Uploaded by

emona.mocku
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
121 views1 page

1.4.1 System Security - Answers - BrainQuest

The document provides information about system threats and threat preventions. It includes a table of system threats like spyware, phishing, and denial of service attacks along with their descriptions. It also includes a table of threat preventions such as penetration testing, firewalls, and encryption along with brief descriptions of each.

Uploaded by

emona.mocku
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 1

CSUK:BrainQuest System Security - ANSWERS

Task 2: Complete the table of ‘Threat Preventions’ by entering the missing


preventative measures and their descriptions.
Task 1: Complete the table of ‘System Threats’ by entering the missing threats and
their descriptions. Threat Prevention Description
Threat Description Where a company will invite / employ experts to try to
simulate a range of network attacks such as Denial of
Monitors the activities of the user and send back as much Penetration Testing Service attacks (DoS), SQL injections and Brute
information about them as possible (passwords, Force Attacks, in an attempt to discover any
Spyware
usernames, websites they visit, purchases they have weaknesses in the system.
made).

The act of acquiring sensitive information about a


user (such as their usernames, passwords, bank Network Forensics Software which continually monitors network traffic
details etc), through the form of direct electronic
Phishing
communications (emails / phone calls) which
impersonate legitimate companies (such as banks)
and ask you to give away sensitive information.
Monitors the data which flows through the
computer’s network ports. It will block unauthorised
Criminals will use trial and error to hack an account by Firewalls
data packets, thus protecting the system from
Brute Force Attack trying thousands of different possible passwords against
hacking.
a particular username.

A set of rules and procedures that network users must


The act of coordinating thousands of computers to Acceptable Use follow. For example, ‘use complex passwords’, ‘have
Denial of Service access a website (web server), at the same time, in Policies different levels of user access’ and ‘lock computers if
Attacks order to overload the webserver, using up its system user leaves their desk’.
resources, thus ‘bringing down’ the website.

The act of manipulating people and is often used by Encryption is where data is scrambled before being
Social Engineering criminals to force people to make mistakes which can Encryption sent across a network so that it is unreadable if
compromise a network’s security. intercepted.

CSUK:Teacher Computer Science UK Membership Site Licence: Do not share outside your centre.

You might also like