1.4 Network Security Flashcards

1
Q

ways to spot a phishing email

A
  • Poor spelling and grammar.
  • The message asks for personal information.
  • Generic greeting/impersonal
  • You didn’t initiate any action to cause the email.
  • sense of urgency in the information
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

what is malware

A

software written to infect computers and commit crimes like fraud and identity theft

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

what is phishing

A

designed to get you to give away personal information using emails purporting to be reputable companies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

what is a brute force attack

A

a trial and error method to decode encrypted data such as passwords and keys carries carried out by programs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

what is a denial of service attack

A

involves flooding a server with useless traffic causing it to overload and become unavailable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

what is data interception and theft

A

an attacker monitors data streams to and from a target to gather sensitive information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

what is an SQL injection

A

a code injection technique used to attack data driven applications

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

what does it mean when people are the weak point of a network

A

when system vulnerabilities are caused by people being careless

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

what is the purpose of a malware attack

A
  • to delete, corrupt, or encrypt files
  • computers can crash, spontaneously reboot or slow down
  • keyboard inputs can be logged and sent to hackers
    internet connections can become slow (due to worms)
  • malware can pass from the computer to the server it is connected to, to all the other clients also connected, and spread very quickly
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

what is the purpose of a phishing attack

A
  • gain access to high value corporate information
  • access a victim’s bank account ot withdraw money
  • open new bank accounts and cards in victim’s name
  • cash illegitimate cheques
  • financial services can blacklist the company (damage to reputation)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

what is the purpose of a brute force attack

A
  • theft of data
  • access to corporate systems
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

what is the purpose of a denial of service attack

A
  • loss of access to a service for customers
  • lost revenue
  • lower productivity
  • damaged reputation
  • average cost of downtime = over £4000/min
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

what is the purpose of data interception and theft

A
  • disclosure of corporate data
  • theft of data
  • usernames and passwords compromised allowing unauthorised access to systems
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

what is the purpose of an SQL injection

A
  • data in the database can be amended or deleted
  • contents of database output, revealing private data
  • new rogue records can be added to the database
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

what are examples of when people can be a weak point of a system

A
  • sharing passwords
  • losing memory sticks/laptops
  • not installing systems updates
  • not logging off/locking computer
  • not encrypting data
  • not applying security to wireless networks
  • not keeping anti-malware up to date
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

what are 7 common prevention methods

A
  • penetration testing
  • anti-malware software
  • firewalls
  • user access levels
  • passwords
  • encryption
  • physical security
17
Q

how do you limit threats posed from a malware attack

A
  • strong security software (firewall, spam filter, anti-virus, anti-spyware)
  • enabling operating system and security software updates
  • training staff to recognise suspicious emails and links
  • backup files regularly onto removable media
18
Q

how do you limit threats posed from a phishing attack

A
  • strong security software
    Training staff to:
  • disable browser pop-ups
  • not disclose personal or corporate information
  • be aware of spotting fake emails and websites
19
Q

what do we mean by strong security software

A

firewall, spam filter, anti-virus, anti-spyware

20
Q

how do you limit the threats posed from a brute force attack

A
  • use a network lockout policy (locks after 3 password attempts)
  • use progressive delays (wait times to retry passowords)
  • staff training: using effective passwords with symbols etc
  • using challenge and response eg “i am not a robot or reCAPTCHA
21
Q

how do you limit the threats posed by a denial of service attack

A
  • strong firewall
  • packet filters on routers
  • configuring the web server
  • auditing, logging and monitoring of systems
22
Q

what is configuration of a web server

A

spotting when attacks are taking place and then preventing them from reaching the server

23
Q

how do you limit the threats posed by data interception and theft

A
  • encryption
  • using virtual networks
  • staff training: logging off and locking computers/offices & use of passwords and portable media
  • investigating your own network vulnerabilities
24
Q

how do you limit threats posed by SQL injection

A
  • validation on input boxes (eg. looking for code that would not be relevant in that box)
  • using parameter queries
  • penetration testing
  • setting database permissions (not all users can perform all actions on a database)
25
Q

what is penetration testing

A

aims to identify weaknesses in a system using a hacker to attempt to break in

26
Q

what does anti-malware software do

A
  • prevents harmful programs from being installed on the computer
  • prevents important files such as the operating system from being changed or deleted
  • if virus does manage to install itself, the software will detect it when it performs regular scans
27
Q

how does anti-malware software help to prevent attacks

A

They detect and remove types of malware and prevent viruses

It does this by looking through its database of virus signatures and looks out for typical virus behaviour.

28
Q

what is a firewall

A

A firewall sets the rules for how data packets can enter or leave the network.

it can block certain IP addresses and block computers on a network from accessing specific sites or categories of sites on a network

29
Q

what three things are common security criteria of a firewall

A
  • where the access is from (the computer’s address)
  • the type of traffic (eg .exe files which may carry viruses)
  • specific web site addresses
30
Q

how do user access levels help to prevent attacks

A

user access rights define groups and allocate specific permissions to those groups

this level of control ensures that people only have access to areas they have the authority to use and if there is a virus or malware then it is limited to the areas the user has access to

31
Q

how do passwords help to prevent attacks

A

it is the easiest way to stop unauthorised access to your computer

32
Q

how does encryption help to prevent attacks

A

Encryption changes the data before it is transmitted so it can only be deciphered by someone with the appropriate key. to anyone intercepting the message it would be unintelligible

33
Q

why do we need encryption

A

There are devices that can read network transmissions just by scanning transmissions without leaving any evidence

34
Q

how does physical security help to prevent attacks

A

it simply makes it difficult for unauthorised people getting access to the server or computers