1.4 Flashcards

1
Q

What is a passive attack

A

Someone intercepts data travelling along a network
Use network monitoring hardware so hard to detect
Protect by encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Active attack

A

Someone attacks network with malware
Easy detected
Protect with firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Insider attack

A

Someone within organisation exploits network access to steal information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Brute force attack

A

Active attack to gain information
Crack passwords through trial and error with automated software
Prevent by locking accounts after lots of failed attempts and strong passwords

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Denial of service attack

A

Hacker stops users accessing part of network
Making network slow, flooding with useless traffic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Malware

A

Installed on someone’s device without their knowledge/consent
Malicious software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are the actions of malware

A

Spyware, scareware, deletes/modify files, locking files, ransomware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

How does malware get onto a device

A

Virus - attach to a certain file and activated by opening a file
Worms - self replicate without users help so spread quickly
Trojans - malware disguised as legitimate software, users install them without realising the hidden purpose, replicates by it self

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

MAC address

A

Can’t be changed
Every device has one
6 hexadecimal numbers separated by dashes
Used by switch

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Ip address

A

Used by routers over networks
IPv4 - 4 denary numbers up to 255 separated by dots
IPv6 - 8 hexadecimal numbers separated by colons

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Social engineering

A

Way to get sensitive information/illegal access to networks by influencing people (employees)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

How does telephones make people weak points

A

Simeon calls pretending to be someone else in company and persuades to get confidential information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Phishing

A

Criminals send emails pretending to be someone containing links to spoof websites that ask to enter passwords so they can access the genuine account
Sent to thousands of people

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Anti-phishing

A

Spot poor grammar
Emails asking to update personal info taken with caution

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

SQL injections

A

Coding language used to access information in data bases
SQL typed into input box which reveals sensitive info
If SQL code is insecure - hackers easily get past firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Penetration testing

A

Organisations employ specialists to hack the network
Identifies weaknesses in networks security and is reported back

17
Q

Physical security

A

Protects physical parts
Locks and passwords restrict access to certain areas
Surveillance equipment deters criminals

18
Q

Passwords

A

Prevent unauthorised users from network
Strong passwords - many characters, numbers, letters, symbols
Change regularly

19
Q

User access levels

A

Control which parts of network people can access
Limits number of people with access to important data - prevents insider attacks

20
Q

Anti - malware

A

Find/stop malware damaging network
Antivirus programs - isolate/destroy viruses
Firewalls - block unauthorised access by examining all data entering and leaving to block potential threats

21
Q

Encryption

A

Data scrambled which only people with the correct key can access
Cipher text - encrypted
Plain text - decrypted
To send data over networks securely