1.4 Network security Flashcards

You may prefer our related Brainscape-certified flashcards:
1
Q

Forms of attack

A

-Malware
-Phishing
-Brute-force attack
-Denial of service attack
-Data interception and theft
-SQL interjection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Malware

A

Any type of harmful program that seeks to damage or gain unauthorized access to your computer system
-e.g. viruses, trojans, ransomware, spyware, adware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Method of prevention - Malware

A

-strong security software - firewall, antivirus, antispyware, antispam
-enabling security software updates
-backup files regularly onto removable data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Phishing

A

-The fraudulent practice of sending emails pretending to be from reputable companies in order to trick individuals in revealing personal information
-e.g. usernames, passwords, credit card details
-e.g. an e-mail has a link that when clicked directs the users to a fake website that collects personal data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Method of prevention - phishing

A

-Network policies
-staff training: awareness of spotting fake emails and websites, not disclosing personal or corporate information, disabling browser pop-ups

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Brute force attack

A

-A trail and error method of attempting passwords and pin numbers. Automated software is used to generate a large number of consecutive guesses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Method of prevention - brute force attack

A

-network lockout policy - lock accounts after 3 passwords
-staff training: using effective passwords with symbols, letters, numbers, mixed case
-challenge response ‘I am not a robot’ - reCAPTCHA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Denial of service attack

A

Flooding a server with useless traffic causing the server to become overloaded and unavailable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Method of prevention - DOS attack

A

-strong firewall
-packet filters on routers
-auditing, logging, monitoring systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Data interception

A

When data packets on a network are intercepted by a third party and copied to a different location that the intended destination
-e.g. monitoring traffic on the network to pick out encrypted passwords, configuration information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Method of prevention - data interception

A

-encryption
-staff training: use of passwords, locking computers, logging off

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

SQL injection

A

When a malicious SQL query is entered into a data input box on a website to trick it into giving unauthorized access to its database

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Method of prevention - SQL injection

A

-validation on input boxes
-using parameters queries
-setting database permissions
-penetration testing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Methods of physical security

A

-lock used to prevent access to server rooms
-biometric devices the require the input of human characteristics (fingerprint)
-CCTV cameras
-keycards
-alarms

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Penetration testing

A

Ethical hacking to find any risks or weaknesses and fix them
-internal testing by somebody within the company
-external testing - white hat hackers try to infiltrate a system from outside the company

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Anti-malware software

A

Used to locate and delete malware on a computer system
-scans each file, compares it against a database of known malware
-files with similar features to malware in the database are identified and deleted

17
Q

Firewall

A

Manages incoming and outgoing network traffic
-each data packet is processed to check whether it should be given access to the network by examining the source and destination address