1.4 Network security Flashcards

You may prefer our related Brainscape-certified flashcards:
1
Q

What are the types of attacks

A

Malware
Phishing
Brute force attack
(D)DoS
Data interception and theft
SQL injection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is malware with examples

A

Software that is designed to hack a system

Viruses - programs embedded (hidden) within other files. They replicate themselves and become part of other programs. Viruses often cause damage by deleting or modifying data
Trojans - programs which pretend to be legitimate but in reality are malware. Trojans cannot spread by themselves Instead they deceive a user into installing the program

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is phishing

A

Emails that try to trick users into giving away personal details, e.g. the email pretends to be a genuine message and tries to deceive the user into following a link to a website that looks like the real company so that they enter their information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is brute force attack

A

A program is used to find a password by trying all possible combinations of characters until the correct one is obtained

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is (D)Dos ((Distributed) Denial of Service)

A

A computer (or many computers) is used to prevent a server from performing its tasks by sending many requests

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is data interception and theft

A

The data is taken during transmission and it is sent to the hacker

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is SQL injection

A

SQL code is entered as a data input

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are the prevention methods

A

Penetration testing
Anti malware software
Firewalls
User access levels
Strong passwords
Encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is penetration testing

A

When an authorised user (usually an external organisation) who finds weak points in the security and exploits them. When they’re done, they report back to their client

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is anti malware software

A

Detects malware that has been installed. Prevents malware from being installed. Removes malware from the system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is a firewall

A

Monitors data traffic going into and out of a computer or network, and either allows the traffic to pass through or blocks it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is user access levels

A

Users should only be able to access the file that they ned, e.g. a student doesn’t need access to the school’s finance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are strong passwords

A

Requires at least eight characters, including at least one uppercase letter, one number and one special character

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is encryption

A

The data (plaintext) is scrambled into different characters so no one will understand it unless they know the key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly