1.4 Network security Flashcards
What are the 4 forms of attack on networks?
insider attack
passive attack
active attack
social engineering
What is an active attack?
When someone uses malware or other technical methods to compromise a network’s security
What is a passive attack?
When an attacker eavesdrops on a network by ‘sniffing’ the data packets
What is an insider attack?
When someone in an organisation gives away access details or sensitive information
What is social engineering?
When a person is exploited into giving away critical information that gives access to the network or accounts
What is penetration testing?
A controlled attack on a network used to find vulnerabilities in a network’s security
What will a good penetration test check?
Likelihood of social engineering
Technical vulnerabilities
a test of damage recovery
What is malware?
Any kind of malicious software that is installed without your knowledge or consent
How does a worm differ from a virus
A virus has a host program whereas a worm spreads without a host program
What are Trojan horses?
Any form of malware that tricks a user into installing it by pretending to be a different program
What does ransomware do?
Encrypts files on an infected system and only decrypts files once a payment has been made to the hacker
What does Spyware, Rootkits and Backdoors do?
Spyware: gathers information about a user by tracking their activity
Rootkits: modifies the computer’s operating system to avoid detection by antivirus software
Backdoors: Opens up an access channel to a computer that other malware can use to take control of the machine
What are three ways that malware can spread?
(self) replication
installations
attachments
What are ways we can defend social engineering?
Education and training
Company security policies
Public awareness campaigns
1) what is phishing?
2) what are ways to protect against phishing?
1) common form of social engineering which uses fake emails and websites to trick uses into giving away sensitive details.
2) Confirming the sender’s email address, looking through the email’s SPAG, never clicking on links that ask you to enter details.