1.4 Network Security Flashcards
Malware:
Malware (Malicious Software) is installed on someone’s device without their knowledge
Malware includes spyware, viruses and ransomware
Social Engineering:
Social Engineering is a way of gaining sensitive information or illegal access to networks by influencing people e.g., employees in large companies
Brute force:
Automated software to produce hundreds of username and password combinations. Trial and error
Denial of Service:
Flooding the server with fake requests. Makes website or network slow and inaccessibility to legitimate users
Data Interception:
Someone monitors data on the network and captures any sensitive or personal data they see
SQL Injection:
Structured Query Language is one of the main coding languages used to access databases. Used to type into a website’s input box which reveals personal data
Penetration Testing:
Organisations employ specialists to identify possible weaknesses in the network’s security. SQL injection.
Anti-malware:
Used to find and stop malware from damaging a network and devices on it. Anti-virus is a type of anti-malware
Firewall:
Examines all data entering and leaving the network and block any potential threats. Stops hackers, malware, unauthorised network access, DoS/DDoS
User Access Levels and Passwords:
Controls which parts of the network different groups of users can access. This limits the number of people with access to important data. Prevent data interception and theft, physical security issues, SQL injection
Passwords:
Help prevent unauthorised users from accessing the network. Should be strong and changed regularly
Encryption:
When data is translated into a code which only someone with the correct key can access. Encrypted text is called ‘cipher text’. Follows DPA, only authorised users can access
Physical Security:
Protects the network from intentional or unintentional damage e.g. fire, flood, locks, cameras, motion sensors, preventing network access. Prevents data interception and theft, social engineering
Types of malware:
Virus: replicate itself, corrupt/delete data, running correct applications
Worms: spread to other drives and computers on network, like viruses
Trojan: disguise as legitimate software with malicious code
Ransomware: locks device, encrypts important files, ransom.
Spyware
Network security mistakes:
Downloading infected files - block access to such websites
Physical access to network - doors, cameras
Sharing data with third parties - blocking access to USB ports, email
Bring in files via any medium - not stopping external devices being used on network