1.4 Network Security Flashcards

You may prefer our related Brainscape-certified flashcards:
1
Q

Define malware

A

Malware is installed on someone’s device without their knowledge. Malware includes spyware, ransomware, worms, Trojan horses and viruses.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Define social engineering

A

Social engineering is a way of gaining sensitive information or illegal access to networks by influencing people e.g employees in large companies.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Define brute force

A

Brute force attacks use automated software to produce hundreds of username and password combinations. Trial and error is used to access a system. A dictionary attack is a form of brute force attack where words from the dictionary are tried first.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Define Denial of Service

A

DoS attacks involve flooding a server with fake requests. This makes the website or network extremely slow and inaccessible to legitimate users. A DoS attack is malicious and prevents the website from being accessible. This could be to silence a website that the user disagrees with or to gain money. It can be used to hide another malicious attack.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Define data interception

A

A ‘man in the middle’ or ‘passive’ attack involves someone monitoring data on the network and capturing any sensitive or personal data they see.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Define SQL injection

A

Structured Query Language is one of the main coding languages used to access databases. sQL code is typed into a websites input box, revealing personal data. If the attack is successful, data can be exposed, altered or deleted.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Define penetration testing

A

Organisations employ specialists to identify possible weaknesses in the networks security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Define anti-malware

A

Anti-malware is designed to find and stop malware from damaging a network and devices on it. Anti-virus is a type of anti-malware.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Define firewall

A

Firewalls examine all data entering and leaving the network and block any potential threats.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Define user access levels

A

User access levels control which part of the network different groups of users can access. This limits the number of people with access to important data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Define passwords

A

Passwords help prevent unauthorised users from accessing the network. Passwords should be strong and changed regularly.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Define encryption

A

Encryption is when data is translated into code which only someone with the correct key can access. Also known as cipher text.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Define physical security

A

Physical security protects the network from intentional or unintentional damage e.g fire, flood. E.g locks, motion sensors, cameras etc

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Define DDoS attack

A

A large number of computers are used to carry out the attack. This is more effective because it generates more traffic.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Define viruses

A

Malicious software designed to cause harm to a network or computer system. Attaches itself to programs or files on a computer or server.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Define worms

A

Replicates itself in order to spread to other computers, often using a computer network. A worm exploits vulnerabilities across the network.

17
Q

Define Trojan horse

A

Malicious computer program designed to access a computer by misleading users of its intent.

18
Q

Define phishing

A

Form of social engineering designed to acquire sensitive information through email etc.

19
Q

What is a white hat hacker?

A

Someone who has permission and is authorised to act as a penetration tester.

20
Q

What is a grey hat hacker?

A

Someone who may not have permission, and may break the law during their testing but they don’t have malicious intent. They inform organisations of vulnerabilities often for a fee.

21
Q

What is a black hat hacker?

A

Someone without permission with malicious intent. These are the people penetration testers are trying to stop.

22
Q

Define biometric security

A

Retina scan, fingerprint, voice, facial recognition

23
Q

What are secure passwords?

A

12 characters or more
Mixture of capital and lower case letters, numbers and symbols
Password encryption
Password reset once a month
Two factor authentication