1.4 Network Security Flashcards

1
Q

Different forms of network attack

A

Passive attack
Active attack
Insider attack
Brute force attack
Denial of Service attack (DoS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Malware full form

A

Malicious Software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Malware

A

installed on a person’s device without their consent

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Ways in which malware can access your computer

A

Viruses
Worms
Trojans

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

How viruses enter the computer

A

Attach to files. Activated when the user opens the file

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What do viruses do?

A

Deletes/corrupts data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

How Worms enter the computer

A

Like viruses, but self – replicate (without users interaction)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What do worms do?

A

Slows down the computer/creates backdoors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

How trojans enter the computer

A

Looks like legitimate software. Users install them thinking that they are legitimate software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What do trojans do?

A

Slows down the computer/creates backdoors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Typical Actions of Malware

A

Ransomware
Scareware
Spyware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Ransomware

A

Encrypts users files and asks for money in exchange for the decryption key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Scareware

A

Tells the user that their computer is infected with viruses and provides malicious links to ‘solve’ them

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Spyware

A

Secretly monitors user actions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Social Engineering

A

influencing/manipulating people to give sensitive information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Phishing

A

when criminals send emails/texts to people claiming to be from a well – known company, and asks the user to update their personal details -> these are sent to criminal
Normally have poor grammar.

17
Q

Defense against Phishing

A

firewall – reduces no. of phishing emails recieved

18
Q

SQL injection

A

SQL commands entered into website’s input box to gain access to database -> sensitive information

19
Q

When will SQL injection work?

A

Will work if a website does not have strong input validation

20
Q

What organisations can do to prevent network attacks

A

Penetration Testing
Physical Security
Passwords
User Access Levels
Anti - Malware Software
Encryption

21
Q

Penetration Testing

A

Company employs specialists to simulate a potential attack on the network -> to find weaknesses that can be fixed

22
Q

Physical Security

A

Protects the physical arts of a network
e.g. locks/passwords to restrict access to server room, surveillance cameras, motion sensors

23
Q

Passwords

A

Help prevent unauthorised access to the network
Should be strong-> combination of letters, symbols, numbers

24
Q

User Access Levels

A

Control which parts of the networks certain people can access
Help to limit number of people with access to sensitive information

25
Q

Anti-Malware Software

A

To find + stop malware from damaging the network
e.g. Anti – Virus, Firewalls

26
Q

Encryption

A

Data (plain text) is translated into a code (cipher text) which can only be read if a person has a decryption

27
Q

Passive Attack

A
  • Someone monitors data travelling on a network to intercept sensitive information ->; done by packet sniffers
  • Hard to detect
28
Q

Active Attack

A
  • Someone attacks a network using malware
  • Easily detected
29
Q

Insider Attack

A
  • Someone within an organisation uses their network access to steal information
30
Q

Brute Force Attack

A
  • Type of Active Attack -> uses trial and error to crack passwords + gain information
31
Q

Denial of Service Attack (DoS)

A
  • When a hacker tries to stop users accessing a website by flooding the network with useless traffic
32
Q

Defense of Passive Attack

A

data encryption

33
Q

Defense of Active Attack

A

Firewall