1.4: NETWORK SECURITY Flashcards
what is malware?
how does it work?
what can it affect?
Malicious software designed to cause harm to a network or computer system.
Attaches itself to programs or files on a computer or server
Can affect all components of an operating system.
how to prevent malware: (2)
Anti-Malware - searches for, detects, and removes viruses, and other malicious software.
Firewall - prevents unauthorised access / hacking into the network.
what is Phishing / Social Engineering?
Commonly involves tricking users into breaking normal security procedures (over phone, email or in person)
how could phishing/ social engineering be prevented? (2)
Firewalls - Filters web content or downloading files.
Limit user access levels/privileges – prevent users from downloading files.
what is a brute force attack?
An attack that attempts to decode passwords/encryption keys/encrypted data.
-by trying out all possible combinations until the correct one is achieved
how could a brute force attack be prevented? (2)
Strong Passwords / Captcha
Preventing number of login attempts or using captcha form for brute force.
what is a DDOS attack?
an attempt to flood a website server with an overwhelming number of data requests to crash or disrupt network sites.
how could a DDOS attack be prevented? (2)
Limit the number of login attempts or requests using captcha form.
Adding filters to router to drop packets from obvious sources of attack.
what is data theft/ interception?
Data travels across networks in packets
Packets can be intercepted (packet sniffers).
Data can also be intercepted physically, for example portable hard drives and other external hardware can be stolen
how to prevent data theft/ interception? (2)
Encryption - jumble/scramble/mix up the data // turns it into cypher text eg; Caesar Cipher, If it is accessed it cannot be understood
Physical Security – Locks on doors, CCTV, Security Guards etc.
what is an SQL injection?
Malicious code entered into a website form to gain unauthorized access to data by modifying websites security forms.
how could SQL injections be prevented? (2)
Penetration testing should be undertaken/vulnerabilities should be found.
Limit user access levels/privileges