1.4 Network Security (1.4.1 And 1.4.2) Flashcards

1
Q

Forms of attack

A
  • malware
  • social engineering
  • brute force attack
  • denial of service attacks
  • data interception and theft
  • SQL injection
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Malware and types of it

A
  • executable programs that run on a computer

- e.g. computer virus, worm, Trojan horse and ransomware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Computer viruses and worms

A
  • viruses infect computers, replicate their code in other programs, infect other computers, and harm the computer by deleting, corrupting or modifying files
  • worms replicate themselves in order to spread to other computers, they slow down networks and computers
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Trojan horses

A
  • they have a program, game or cracked file which is something the user wants
  • they have negative program code which causes damage, takes control or provides access to the computer
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Ransomware

A
  • software which holds a computer hostage by locking or encrypting access to it
  • if the data is encrypted, it won’t be able to be recovered unless backups are available
  • once a ransom is paid to the attacker, access is restored
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Social engineering

A
  • ability to obtain confidential information by asking people for it
  • e.g. shoulder surfing, phishing
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Shoulder surfing

A
  • ability to get information or passwords by observing as someone types them in
  • either by looking over someone’s shoulder or using a CCTV camera
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Phishing

A
  • emails, texts or phone calls sent to users commonly pretending to be from a bank or website
  • messages will try to get personal information like: usernames, passwords, credit card details
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Brute force attacks

A
  • a hacker tries every combination of password until the correct one is found
  • this is done using a computer program
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Denial of service attacks

A
  • a hacker infects a computer so that it sends as many requests to the server as it can
  • the server then can’t respond fast enough so it slows or goes offline
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Data interception and theft

A
  • allows the attacker to intercept communications between the user and the server
  • the attacker can then:
    • eavesdrop to find passwords and personal information
    • add different information to a web page or other communications such as email
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

SQL Injection

A
  • it’s a database of query language
  • takes advantage of web input forms to access or destroy data
  • SQL commands can be input into web forms instead of the expected ‘real’ data
  • this can be interpreted by vulnerable web applications and end up causing damage or releasing personal information
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Methods to prevent vulnerabilities

A
  • penetration testing
  • anti-malware software
  • firewalls
  • user access levels
  • passwords
  • encryption
  • physical security
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

penetration testing

A
  • deliberately trying to find holes in your own system

goal is to:

  • identify the targets of potential attacks
  • identify possible entry points
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

anti-malware software

A
  • detects malware such as viruses, worms, trojans and spyware
  • when a virus or new malware is detected it is sent to the anti-virus company
  • they verify it is malware then create a signature of the virus
  • they then add it to their virus database and tell computers to run an update
  • viruses can morph, makes it harder to create a signature
  • anti-malware software must be running at all times and has to be up to date
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

firewalls

A
  • separates a trusted network from an untrusted network
  • data is sent around a network in small packets
  • incoming and outgoing packets are checked against specified rules
  • firewalls can be run on dedicated hardware or as software
  • they may be built into your hardware
17
Q

firewall features

A
  • preventing attackers from gaining access to computers on a network
  • can block certain malicious computers by filtering packets from a certain IP address
  • prevents access to certain ports on the network
18
Q

user access levels

A
  • access rights may be set on disks, folders and files
19
Q

password policy

A
  • passwords are often checked as they are created to make sure that they conform to the parameters given in a required policy
20
Q

encryption

A
  • way of securing data so that it cannot be read without the encryption key
  • if a hacker obtains data, they won’t be able to easily read it
  • devices and computers can also have their storage and hard disk data encrypted
  • websites use HTTPS to encrypt the connection to the server
  • files can be encrypted individually on a computer using a password
21
Q

physical security

A
  • where hardware, software and networks are protected by physical methods
  • methods include: CCTV, security guards, intruder alarms