1.4 Network Security Flashcards

1
Q

Malware:

A

Malware (Malicious Software) is installed on someone’s device without their knowledge
Malware includes spyware, viruses and ransomware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Social Engineering:

A

Social Engineering is a way of gaining sensitive information or illegal access to networks by influencing people e.g., employees in large companies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Brute force:

A

Automated software to produce hundreds of username and password combinations. Trial and error

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Denial of Service:

A

Flooding the server with fake requests. Makes website or network slow and inaccessibility to legitimate users

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Data Interception:

A

Someone monitors data on the network and captures any sensitive or personal data they see

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

SQL Injection:

A

Structured Query Language is one of the main coding languages used to access databases. Used to type into a website’s input box which reveals personal data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Penetration Testing:

A

Organisations employ specialists to identify possible weaknesses in the network’s security. SQL injection.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Anti-malware:

A

Used to find and stop malware from damaging a network and devices on it. Anti-virus is a type of anti-malware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Firewall:

A

Examines all data entering and leaving the network and block any potential threats. Stops hackers, malware, unauthorised network access, DoS/DDoS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

User Access Levels and Passwords:

A

Controls which parts of the network different groups of users can access. This limits the number of people with access to important data. Prevent data interception and theft, physical security issues, SQL injection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Passwords:

A

Help prevent unauthorised users from accessing the network. Should be strong and changed regularly

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Encryption:

A

When data is translated into a code which only someone with the correct key can access. Encrypted text is called ‘cipher text’. Follows DPA, only authorised users can access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Physical Security:

A

Protects the network from intentional or unintentional damage e.g. fire, flood, locks, cameras, motion sensors, preventing network access. Prevents data interception and theft, social engineering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Types of malware:

A

Virus: replicate itself, corrupt/delete data, running correct applications
Worms: spread to other drives and computers on network, like viruses
Trojan: disguise as legitimate software with malicious code
Ransomware: locks device, encrypts important files, ransom.
Spyware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Network security mistakes:

A

Downloading infected files - block access to such websites
Physical access to network - doors, cameras
Sharing data with third parties - blocking access to USB ports, email
Bring in files via any medium - not stopping external devices being used on network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly