1.3.3.9/10 Network Security Flashcards
What are the aims of network security?
Only allow authorised users to access what they need.
Prevent unauthorised access.
Minimise the potential damage caused by unauthorised access.
What are the 3 types of hackers?
- Black-hat hackers
- Grey-hat hackers
- White-hat hackers
What does a black-hat hacker do?
They attempt to gain access via nefarious means, typically to steal company secrets or cause damage.
What does a grey-hat hacker do?
They are not employed by a company, but they still attempt to locate flaws in company-wide computer systems as a hobby. What they do is technically illegal, but they then inform the company of the flaw so the company can fix it.
What does a white-hat hacker do?
These are security experts (often ex-hackers) employed by a company. Also known as ethical hackers, they use their expertise to try and find vulnerabilities and fix them.
What does the term “malware” mean?
An umbrella term that covers any computer code written with the intent to frustrate or harm.
What are the common types of malware?
Virus
Spyware
Denial-of-Service attack
SQL injection
Social engineering
Phishing (Social engineering)
Pharming (Social engineering)
What is a virus?
A piece of code capable of copying itself and spreading throughout a system. They are typically designed to have a detrimental effect like corrupting a file system or destroying data.
What is spyware?
A form of malware that covertly obtains information about a user’s computer activities by transmitting data from their device.
It can be used in a variety of ways to harvest all sorts of sensitive and personal data from a device
What are the different ways in which spyware is used?
Internet surfing habits
Email addresses
Visited web pages
Downloads/download habits
Passwords
Credit card numbers
Keystrokes
Cookies
What is a Denial-of-service (Dos) attack?
The attacker floods a server with useless traffic, causing the server to become overloaded.
Many of the past Dos attacks take advantage of the limitations of the TCP/IP stack.
They often target web servers of high-profile organisations such as banks, large scale e-commerce businesses and governments.
They typically cost a great deal of time and money to handle.
What is a Distributed Denial-of-service (DDos) attack?
Multiple systems orchestrate a synchronised attack on a single computer system.
These multiple systems are in different locations and in some instances, the owners of these systems are unaware they’re being used. This leaves them with the classification of zombie.
What is SQL injection?
A code injection technique used to attack data-driven applications. This attack is used to breach poorly coded database applications. Code is entered into input text boxes that are executed by the server.
What does Social Engineering mean?
An umbrella term describing the various types of malware that prey upon human error with the intention of obtaining private information or access to a system.
Social engineering scams lure users into exposing data, spreading data or providing access to a system.
What are some examples of social engineering scams used?
Baiting
Scareware
Pretexting/blagging
Phishing
Pharming
Shoulder-surfing
Quid pro quo
Vishing