1.4 Network security Flashcards
6 forms of attack
Malware, social engineering, brute-force attack, denial of service attacks, data and interception theft, SQL injection
Define malware
General term for any hostile or intrusive software - any kind of malicious software that is installed without your knowledge.
How is social engineering used?
A manipulation technique that exploits human error to gain private information, access, or valuables.
How are denial of service attacks used?
An objective of attackers to shut down a webserver or website - overload the site with thousands of requests for data until it crashes.
How is data interception and theft done?
Hijacking software can be used to pretend to be the destination for communications across a network. ‘Packet sniffing’ software and hardware can be used to monitor network traffic.
What is the concept of SQL injection?
Adding or ‘injecting’ SQL commands via data input boxes on a web page in a web site. The SQL commands can alter and compromise the security of the database behind the website.
7 prevention methods
Penetration testing, anti-malware software, firewalls, user access levels, passwords, encryption, physical security
How does penetration testing prevent vulnerabilities?
Assess the security of their computer systems, networks, and websites. During the test, a simulated attack takes place, specifically looking for vulnerabilities and exploits. The aim is to identify weaknesses so that they can be fixed.
How does anti-malware software prevent vulnerabilities?
It works by scanning through all the files on a computer and checking them against a list of known malwares. Only detect, prevent and remove known malware (reactive).
How do firewalls prevent vulnerabilities?
Monitors traffic going into and out of a computer or network, and either allows the traffic to pass through or blocks it based on rules, known as the firewall policy.
How do passwords prevent vulnerabilities?
The purpose of a password is to verify who a user is. Without knowing the password, you cannot use a user ID to sign into a network.
How does encryption prevent vulnerabilities?
Even if a hacker gains access to encrypted data, they will not be able to understand it.
How does physical security prevent vulnerabilities?
Protection of personnel, hardware, software, networks and data from physical actions and events that could cause serious loss or damage.
5 examples of physical security
Barriers, cameras, alarm systems, sensors, video surveillance