1.3.3 PART 2 Network Security Flashcards

1
Q

Malware?

A

Any software designed to harm computer systems or networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Types of malware?

A

Trojan horse
Spyware
Virus
Worm
Adware
Ransomware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Trojan horse?

A

Disguises as a legitimate program;

can’t self-replicate, Requires human intervention to install

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Spware

A

Steals data can monitor key strokes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Virus

A

Attaches & self-replicates- self executing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Worm?

A

Standalone program that can spread between file;

Doesn’t need to attach to files
Self-executing
Aims to spread across networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Adware?

A

Displays unwanted adverts for user on computer system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What’s a cyberattack?

A

An attempt by hackers to damage or destroy a computer network or system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Types of cyberattacks?

A

Phishing
Pharming
Social Engineering
Brute force attack
(Distributed) Denial of service (DDos/ Dos)
SQL Injection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Phishing?

A

Fake email from trustworthy source to steal money, gain access to sensitive data, or install malware.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Pharming

A

Redirect a site’s traffic to a bogus sit, which attempts to steal details

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Social Engineering?

A

Manipulating someone to provide data / info.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Denial of Service?

A

Flooding a server with requests, preventing client requests receiving responses

If distributed- multiple attacking computers flood one server with requests.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

SQL Injection?

A

Instantiating an SQL command into a database, in order to retrieve data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Buffer overflow?

A

Occurs when a program accidently writes data to a location too small to handle it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Methods of network protection?

A

Anti-malware
Anti-spyware
Education / training
Passwords
Firewalls
Proxy servers
Code quality

17
Q

Anti-malware / anti-spyware?

A

Detects malware / spyware & removes it.

18
Q

Education / training?

A

Teaching people to:
Check emails thoroughly
Identify bogus links
Use portable media

19
Q

How can passwords protect?

A

Companies / individuals can incorporate:

A strong password policy
Use a password manager
Changing passwords yearly
2FA

20
Q

Auto-update and Auto backup?

A

An up-to-date OS improves security

Can return to backup save points- prior to malware installation

21
Q

What is a firewall?

A

Hardware/software that monitors, filters and blocks traffic/ packets being transmitted, sitting between two networks

Acting as a barrier between a trusted and untrusted network, using static filtering or stateful inspection

22
Q

What is the purpose of a firewall?

A

Attempts to prevent malicious traffic entering the trusted network

Can be configure to prevent certain data leaving the network

23
Q

What is static filtering?

A

Checking the headers of packets arriving from an untrusted network

Checks against a set of rules (packet filters) defined by the network admin

24
Q

What type of firewalls use stateful inspection?

A

Sophisticated firewalls, due to needing to carry out more intelligent filtering.

25
Q

What is stateful inspection?

A

Dynamic filtering; continuously monitoring inbound/outbound traffic, after a connection is established.

Analyses packet types and the payload.

26
Q

What is a prerequisite of stateful inspection?

A

Firewall must maintain a connection table

Tracks all conversations between networks.

27
Q

What’s a proxy server?

A

An intermediate stage when requesting resources from a server.

This proxy makes a web request on behalf of the terminal- hiding the IP address of the requesting device- Enables anonymous surfing

28
Q

Benefits of a proxy server?

A

Prevents unauthorized network access

Restricts website access

Protects company data and intellectual property

29
Q

How does improved code quality reduce malware threats?

A

It’s harder to find exploitable flaws