1.4 Network security Flashcards

1
Q

6 forms of attack

A

Malware, social engineering, brute-force attack, denial of service attacks, data and interception theft, SQL injection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Define malware

A

General term for any hostile or intrusive software - any kind of malicious software that is installed without your knowledge.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

How is social engineering used?

A

A manipulation technique that exploits human error to gain private information, access, or valuables.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

How are denial of service attacks used?

A

An objective of attackers to shut down a webserver or website - overload the site with thousands of requests for data until it crashes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

How is data interception and theft done?

A

Hijacking software can be used to pretend to be the destination for communications across a network. ‘Packet sniffing’ software and hardware can be used to monitor network traffic.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the concept of SQL injection?

A

Adding or ‘injecting’ SQL commands via data input boxes on a web page in a web site. The SQL commands can alter and compromise the security of the database behind the website.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

7 prevention methods

A

Penetration testing, anti-malware software, firewalls, user access levels, passwords, encryption, physical security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

How does penetration testing prevent vulnerabilities?

A

Assess the security of their computer systems, networks, and websites. During the test, a simulated attack takes place, specifically looking for vulnerabilities and exploits. The aim is to identify weaknesses so that they can be fixed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

How does anti-malware software prevent vulnerabilities?

A

It works by scanning through all the files on a computer and checking them against a list of known malwares. Only detect, prevent and remove known malware (reactive).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

How do firewalls prevent vulnerabilities?

A

Monitors traffic going into and out of a computer or network, and either allows the traffic to pass through or blocks it based on rules, known as the firewall policy.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

How do passwords prevent vulnerabilities?

A

The purpose of a password is to verify who a user is. Without knowing the password, you cannot use a user ID to sign into a network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

How does encryption prevent vulnerabilities?

A

Even if a hacker gains access to encrypted data, they will not be able to understand it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

How does physical security prevent vulnerabilities?

A

Protection of personnel, hardware, software, networks and data from physical actions and events that could cause serious loss or damage.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

5 examples of physical security

A

Barriers, cameras, alarm systems, sensors, video surveillance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly