1.4 Network Security Flashcards
Methods to prevent vulnerabilities
- penetration testing
- anti-malware software
- firewalls
- user access levels
- passwords
- encryption
- physical security
Penetration testing
When organisations employ specialists to stimulate potential attacks on their network.
Testing designed to check the security and vulnerabilities of your on system and identify possible entry points.
Anti-malware software
Detects malware such as viruses, worms, trojans and spyware and stops from damaging an organisations network and the devices on it.
There are lots of different types of antimalware software, including antivirus programs which isolate and destroy computer viruses.
Firewalls
A computer application used in a network to prevent external users gaining unauthorised access to a computer system.
Firewalls examine all data entering and leaving the network and block any potential threats.
User Access Levels
The amount of access a given user is allowed to a computer. On a network most users will have restricted access. Whereas a systems administer or network technician would be allowed much greater access with fewer restrictions
It also defines which users can see which folders and files and the type of access they have to them. Eg: Read-Only or Read-Write.
User access levels help limit the number of people with access to important data, so help prevent insider attacks on the network.
Passwords
A password is typically a string of characters used to gain access to a service or system. They help prevent unauthorised users accessing the network.
The password policy may be enforced by the computer system which will force a user to have a “strong” password.” The longer the number of characters, the more difficult it is to actually guess the password. The password policy may also force users to change their passwords regularly.
Encryption
When data is translated into a code which only someone with the correct key can access, meaning unauthorised users cannot read it.
Encrypted text = cipher text
Unencrypted data = plain text
Encryption is essential for sending data over a network securely.
Physical security
Protects the physical parts of a network from either intentional or unintentional damage (e.g. fire, flooding, theft etc.)
E.g Locks and passwords to restrict access to certain areas, e.g. server rooms.
Surveillance equipment, e.g. cameras or motion sensors to deter intruders.