1.4 – Network security Flashcards

1
Q

What’re the different threats posed for networks?

A
  • Malware
  • Phishing
  • Brute Force
  • Denial of Service
  • Data interception & theft
  • SQL Injection
  • People/Social Engineering
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is Malware?

A

Software written to cause loss of data, encryption of data, fraud and identity theft , eg viruses, spyware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What happens during a Malware attack?

A
  • Files are deleted, corrupted or encrypted
  • Computers crash, reboot randomly and slow down
  • Internet slows down
  • Keyboard inputs sent to hackers
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is a Phishing attack?

A

Sending fraud emails (pretending to be companies/people) to get personal information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What happens during a Phishing attack?

A
  • Accessing accounts to get money
  • Open bank accounts, credit cards & cash false cheques
  • Access high value corporate data
  • Cause companies to be blacklisted
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is a Brute Force attack?

A

A trial and error method of getting passwords/pin numbers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What happens during a Brute Force attack?

A
  • Hackers steal data
  • Gains access to corporate systems
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is a Denial of Service attack?

A

Flooding a server with useless traffic, overloading it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What happens during a DOS attack?

A
  • Block customers accessing services
  • Loose revenue
  • Decrease productivity
  • Damage reputation
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is a Data Interception & Theft attack?

A

Stealing computer-based info from someone, compromising privacy/getting personal info

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What happens during a Data Interception & Theft attack?

A
  • Usernames & passwords compromised
  • Leaking & stealing data
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is an SQL Injection?

A

A technique to view/change data by adding extra code into an input box

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What happens during an SQL Injection?

A
  • Contents of databases leaked
  • Data in databases amended/deleted
  • New fake records added to databases
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is Social Engineering?

A

The use of deception to manipulate individuals into divulging confidential or personal information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

How can people pose a threat to networks?

A

by NOT doing the following:
- Installing updates
- Locking doors to computer rooms
- Keeping anti-malware updated
//
- Writing passwords on sticky notes, weak passwords
- Not encrypting data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are the common methods of preventing attacks?

A
  • Penetration testing
  • Anti-Malware software
  • Firewalls
  • User Access Levels
  • Passwords
  • Encryption
  • Physical Security
17
Q

What can prevent Malware attacks?

A
  • Enabling OS & security software updates
  • Staff training
  • Backup files regularly
    & Softwares such as:
  • Firewall , Spam Filters , Anti-Virus/Spyware/Spam
18
Q

What is anti-malware software?

A

Software that protects computing devices against malicious code

19
Q

What is a Firewall?

A

Used in a network to prevent external users gaining unauthorised access to a computer system / network

20
Q

What can prevent Phishing attacks?

A
  • Strong security software
  • Staff training : Awareness of fake emails, pop-ups & not leaking personal/corporate info
21
Q

What can prevent Brute Force attacks?

A
  • Network lockout policy: locking after 3 password attempts
  • Progressive delays
  • Staff training: Strong passwords
  • Challenge responses , recaptcha (bot response)
22
Q

What can prevent Denial of Service attacks?

A
  • Strong firewall
  • Packet filters on routers
  • Configuring web servers
  • Auditing, logging & monitoring systems
23
Q

What can prevent Data Interception & Theft?

A
  • Encryption
  • Use of virtual networks
  • Staff training: Passwords, locking computers, use of portable media
  • Investigating own network vulnerability
24
Q

What can prevent an SQL Injection?

A
  • Validation on input boxes
  • Using parameter queries
  • Setting database permissions
  • Penetration testing
25
Q

What is Penetration testing?

A

Testing designed to check the security and vulnerabilities of a system

26
Q

What is Physical Security?

A

Any form of real world physical security to help protect data and systems

27
Q

What are User Access Levels?

A

The amount of access a user is allowed to a computer system