1.4 - Network security Flashcards

You may prefer our related Brainscape-certified flashcards:
1
Q

What are the forms of attack?

A
  • Active
  • Passive
  • External
  • Internal
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is an active attack?

A

Where the hacker attempts to modify or delete data

or

to prevent a network from operating correctly

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is a passive attack?

A

Where the hacker monitors a network in order to gain information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is a passive attack also known as?

A

Eavesdropping

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is malware?

A

Malicious software that is designed to hack a system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is an Internal attack?

A

Where someone within an organisation attempts to hack its network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is an External attack?

A

Where someone outside of an organisation attempts to hack its network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is Social engineering?

A

Tricking others into revealing their personal data by posing as a trusted source

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Give some examples of some types of Social engineering:

A
  • Phishing
  • Shoulder surfing
  • Blagging
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is phishing?

A

An attempt to gain personal information about someone by way of deception by email

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is a Brute force attack?

A

Automated or manual attempts to gain unauthorized access to secure areas by trying all the possible password or key combinations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

How can a Brute force attack be sped up?

A

If multiple computer systems are used

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is a DoS attack?

A

Severs & devices are flooded w/too many requests/ packets, causing them to crash or become unstable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What does DoS stand for?

A

Denial of service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is a DDoS?

A

A coordinated attack using a botnet of infected systems to overload a server with requests

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What does DDoS stand for?

A

Distributed Denial of Service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is a botnet?

A

A large group of devices controlled and use maliciously by an attacker

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is Data interception & theft?

A

Data may be intercepted during transmission, but physical theft can occur where storage devices/ data files are left insecurely

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What are SQL injections?

A

Pieces of malicious SQL is entered into a website’s input box which then reveal sensitive information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

When is a SQL used?

A

To search databases/ access information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What does SQL stand for?

A

Structured Query Language

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Describe what happens when data is entered into a webform?

A

The website will contact the database server to find the account details & display them

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Describe what happens when a hacker enters a malicious SQL into the password field:

A

It will modify the SQL that is executed
—> They can gain administrator privileges or view + edit contents of the database

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What is Interception?

A

When data packets on a network are intercepted by a third party and copied to a different location than the intended destination

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Name the software that is used in interception

A

Packet sniffers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

What is Blagging?

A

Dishonestly persuading someone to divulge personal information by deception

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Give an example of Blagging

A

Someone makes up a story to gain a person’s interest and uses this to encourage them to give away information about themselves, or even send money

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

What is Shouldering?

A

Looking over someone’s shoulder when they enter a password or PIN

29
Q

What is spyware?

A

Software that secretly records the activities of a user on a computer

30
Q

What is keyloggers?

A

Secretly records the key presses of a user on a computer
—> Data is sent back to the attacker

31
Q

What is the main aim of keyloggers and spyware?

A

To record usernames, passwords & credit card information

32
Q

What are worms?

A

Self-replicate without any user help. They spread from system to system by finding weaknesses in software.
—> Spread very quickly

33
Q

What are Viruses?

A

Self replicates without any user help and spreads from system to system by attaching itself to infected files

34
Q

How are viruses activated?

A

When opened by a human

35
Q

What is Trojans?

A

Malware that is disguised as legitimate software - users are tricked into installing it

36
Q

How are Trojans spread?

A

Users install them not realising they have a hidden purpose
—> Gives the attacker a backdoor access to the system

37
Q

What is Ransomware?

A

Locks files on a computer system using encryption so that a user can no longer access them

38
Q

What is the main aim of Ransomware?

A

Attacker demands money from the victim to decrypt the data

39
Q

Why are ransomware attackers so hard to trace?

A

They use digital currencies (like bitcoin) which makes it hard to trace them

40
Q

What measures should organisations be taking to prevent their network from having any vulnerabilities?

A
  • Regularly test network & find any weaknesses
  • Use passwords
  • Enforce user access levels
  • Install anti-malware software & firewall
  • Encrypt sensitive data
41
Q

Why should organisations be using passwords to prevent their network from having any vulnerabilities?

A

To prevent unauthorised people from accessing the network

42
Q

Why should organisations Enforce user access levels to prevent their network from having any vulnerabilities?

A

To limit the number of people with access to sensitive information

43
Q

What do user access levels determine the access to?

A
  • Software
  • Email
  • Internet access
  • Documents and data
  • Ability to install and/or remove software
  • Ability to maintain other users’ accounts
44
Q

What is encryption?

A

The process of scrambling data into an unreadable format so that attackers cannot understand it if intercepted during transmission

45
Q

How is data encrypted?

A

Using an encryption key - only at the correct destination will the encryption key convert the data back into its original form

46
Q

What is anti-malware software?

A

Software used to locate and delete malware (like viruses) on a computer system

47
Q

How does anti-malware software work?

A
  • Software scans each file on computer and compares it against a database of known malware.
  • Files w/ similar features of malware are identified and deleted.
48
Q

Why must anti-malware software be regularly updated?

A

New forms of malware are created each day by attackers, therefore it must be regularly updated to keep systems secure

49
Q

What are some other roles of anti-malware software?

A
  • Checks all incoming and outgoing emails + attachments
  • Checks files as they are downloaded
  • Scans the hard drive for viruses and deletes them
50
Q

Why should organisations Install anti-malware software & firewall to prevent their network from having any vulnerabilities?

A

To prevent & destroy malicious software attacks

51
Q

Give some examples of anti-malware?

A
  • Anti-virus software
  • Anti-phishing tools
  • Anti-spyware software
52
Q

What is the main disadvantage of anti-malware?

A

It can only detect, prevent and remove known malware

53
Q

What is a firewall?

A

A tool that examines all data entering & leaving the network & block any potential threats

54
Q

How does a firewall check whether a data packet should be given access to the internet?

A

It examines the source and destination address of each data packet

55
Q

What are some roles of a firewall?

A
  • Blocks access to insecure websites
  • Blocks certain programs from accessing the internet
  • Blocks unexpected / unauthorised downloads
  • Prevents specific users on a network accessing certain files
56
Q

How can physical security be used to protect computer systems?

A
  • Lock - Can be used to prevent access to certain locations that store confidential data (e.g. Server rooms)
  • Biometric devices - Require input of a human characteristic. When inputted, this is checked against a database and will allow access to a certain user
  • CCTV cameras
  • Alarms
57
Q

What is Penetration testing?

A

When organisations employ specialists to simulate potential attacks on their network

58
Q

What is Penetration testing used for?

A

To identify possible weaknesses in a network’s security by trying to exploit them
—> Results are then reported back

59
Q

What is Penetration testing also known as?

A

Pentesting

60
Q

Give some common prevention methods for Spyware?

A

Anti-spyware

61
Q

Give some common prevention methods for Viruses?

A

Anti-malware

62
Q

Give some common prevention methods for a DoS attack?

A

Having a firewall

63
Q

Give some common prevention methods for a Brute-force attack?

A

Strong passwords

64
Q

Give some common prevention methods for Phishing?

A

User awareness

65
Q

Give some common prevention methods for Blagging?

A

User awareness

66
Q

Give some common prevention methods for Shoulder surfing?

A

Concealing passwords/ PINs

67
Q

Give some common prevention methods for a SQL injection?

A

Penetration testing

68
Q

What are features of a strong password?

A

*At least eight characters
* Include upper case
* Include lower case
* Include special characters
* Include numbers