13b Internet Security Flashcards

1
Q

What is a firewall?

A

A network security system controlling incoming and outgoing traffic. Acting as barrier between other untrusted networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the 5 methods used by firewalls?

A
  1. Packet filtering
  2. State full inspection
  3. Ports
  4. Ip addresses
  5. Unusual behaviour
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is packet filtering?

A

Accepting and blocking packets based on the ip of origin or the protocol being used.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is stateful inspection?

A

The packets contents are examined for malicious code. If any is found it is rejected.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

How do firewalls use ports?

A

Blocks ports when they are no longer in use so malicious data isn’t sent through them.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

How do firewalls use up addresses?

A

Unknown IPs are blocked

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

How do firewalls use unusual behavior to secure networks?

A

They observe network traffic patterns and if a lot more data than usual comes through the packets are blocked. This prevents DDOS attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What other function do firewalls have?

A

They keep a log of the entire history of incoming and outgoing data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is a proxy server?

A

A device that acts as a middleman between your computer and the internet. It filters access to websites.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are the 4 functions of proxy servers?

A
  1. Hides IP address
  2. Content filtering
  3. Caching
  4. Tracks internet usage
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is the problem with symmetric encryption?

A

It relies on the receiver to have the correct key. How should this key be sent to them?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is symmetric encryption?

A

When the message is encrypted using a key by the sender and the receiver decrypts using the same key.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

How does asymmetric encryption work?

A
  1. Sender encrypts with receivers public key
  2. Receiver decrypts with their private key
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is the best use for asymmetric encryption?

A

Best used for key exchange as once keys have been exchanged allowing symmetric, symmetric encryption is faster.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

How is a digital signature produced?

A
  1. The message is hashed (encrypted)
  2. The message is encrypted with A’s private key
  3. The original message and the encrypted message (digital signature) are encrypted with B’s public key
  4. B receives the message and decrypts with their private key
  5. The digital signature is decrypted with A’s public key
  6. The
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What threats are the three main types of malicious software?

A

Viruses
Trojan horses
Worms

17
Q

How do viruses work?

A

Attaches itself to a file and spreads when interacted with.

18
Q

How do works work?

A

Works are independent of the host program and wait until the device connects to a network sand then spreads throughout it. Often used to create botnets.

19
Q

How does a Trojan horse work?

A

Disguises itself as useful files to infiltrate. Doesn’t replicate or spread.
Creates backdoors allowing data to be stolen.

20
Q

What are the methods for defending against viruses and Trojans and worms?

A
  1. Configure a proper firewall
  2. Keep software up to date
  3. Use a firewall to cloak your device from the network
  4. Never open emails without scanning with anti virus software
  5. Regularly scan the device with anti virus software