CSUK:BrainQuest System Security - ANSWERS
Task 2: Complete the table of ‘Threat Preventions’ by entering the missing
preventative measures and their descriptions.
Task 1: Complete the table of ‘System Threats’ by entering the missing threats and
their descriptions. Threat Prevention Description
Threat Description Where a company will invite / employ experts to try to
simulate a range of network attacks such as Denial of
Monitors the activities of the user and send back as much Penetration Testing Service attacks (DoS), SQL injections and Brute
information about them as possible (passwords, Force Attacks, in an attempt to discover any
Spyware
usernames, websites they visit, purchases they have weaknesses in the system.
made).
The act of acquiring sensitive information about a
user (such as their usernames, passwords, bank Network Forensics Software which continually monitors network traffic
details etc), through the form of direct electronic
Phishing
communications (emails / phone calls) which
impersonate legitimate companies (such as banks)
and ask you to give away sensitive information.
Monitors the data which flows through the
computer’s network ports. It will block unauthorised
Criminals will use trial and error to hack an account by Firewalls
data packets, thus protecting the system from
Brute Force Attack trying thousands of different possible passwords against
hacking.
a particular username.
A set of rules and procedures that network users must
The act of coordinating thousands of computers to Acceptable Use follow. For example, ‘use complex passwords’, ‘have
Denial of Service access a website (web server), at the same time, in Policies different levels of user access’ and ‘lock computers if
Attacks order to overload the webserver, using up its system user leaves their desk’.
resources, thus ‘bringing down’ the website.
The act of manipulating people and is often used by Encryption is where data is scrambled before being
Social Engineering criminals to force people to make mistakes which can Encryption sent across a network so that it is unreadable if
compromise a network’s security. intercepted.
CSUK:Teacher Computer Science UK Membership Site Licence: Do not share outside your centre.