12. Network Security Flashcards

1
Q

What are the three main goals of network security?

A

Confidentiality (protecting data from unauthorized access), integrity (ensuring
data is not tampered with), and availability (ensuring services remain accessible).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Why is the human factor often the weakest link in network security?

A

Human errors like weak passwords, clicking on malicious links, or falling for
phishing scams can compromise even the most secure systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the role of IPSec in network security?

A

IPSec secures IP datagrams by providing encryption, authentication, and
integrity, ensuring secure communication.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

How do public and private keys work in encryption?

A
  • Public key: Used for encrypting data, widely shared.
  • Private key: Used for decrypting data, kept confidential by the owner.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is the function of SSL/TLS in web security?

A

Secure Socket Layer (SSL) and Transport Layer Security (TLS) encrypt
communication between a client and server, ensuring data confidentiality and
authenticity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are the primary threats to web applications?

A
  1. Integrity threats (data modification).
  2. Confidentiality threats (unauthorized access).
  3. DoS attacks (disruption of services).
  4. Authentication attacks (identity spoofing).
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

How do secure coding practices prevent unchecked code attacks?

A

By validating user inputs, sanitizing data, and ensuring only safe inputs are
processed, preventing exploits like SQL injection or XSS attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the difference between a virus and a worm?

A
  • Virus: Attaches to executable files and spreads when the file is executed.
  • Worm: Spreads independently over networks without needing a host file.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is a Trojan horse in network security?

A

A malicious program disguised as legitimate software, used to gain
unauthorized access to systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What does the term “denial of service” mean?

A

A type of attack that overwhelms network resources, making services
unavailable to legitimate users.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

How does encryption ensure data confidentiality?

A

By converting data into an unreadable format that can only be decrypted by
someone with the correct key.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is PGP, and how is it used in email security?

A

Pretty Good Privacy (PGP) is a cryptographic tool that encrypts emails to
ensure they remain private and secure during transmission.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are examples of malicious programs and how do they operate?

A
  • Trap Door: Provides hidden access to a system.
  • Logic Bomb: Activates under specific conditions.
  • Worm: Propagates via networks.
  • Virus: Infects files and spreads upon execution.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is the purpose of antivirus software?

A

To detect, block, and remove malware, protecting systems from threats like
viruses, worms, and Trojans.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

How do digital certificates enhance network security?

A

By verifying the authenticity of public keys, ensuring they belong to the
claimed entity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly