1.4 – Network security Flashcards
What is one primary reason individuals or businesses might be targeted for a network attack?
One primary reason for a network attack is the heavy reliance of businesses and individuals on network access. If someone aims to damage a business or individual discreetly, bringing down the network is a potential avenue.
List some reasons why someone might want to bring down a network.
-To gain a competitive advantage over the business or individual by undermining customer trust.
-To blackmail an individual for financial gain or other similar motives.
-To express opposing political views towards the business or its values.
-To exploit weaknesses in the network security of the targeted business.
Simply out of boredom.
How can bringing down a network provide a competitive advantage to an attacker?
Bringing down a network can undermine customer trust in a business, potentially leading customers to seek more secure alternatives among the business’s rivals. This loss of trust may give the attacker a competitive advantage.
What is one potential motive for blackmailing an individual through a network attack?
Blackmailing an individual through a network attack may be driven by the desire to gain money or something similar in exchange for not causing harm to the individual or their business.
How might an attacker exploit weaknesses in a business’s network security?
Attackers may exploit weaknesses in a business’s network security to gain unauthorized access, extract sensitive information, disrupt operations, or potentially cause financial harm.
What is malware, and what is its primary objective?
Malware, also known as bad software, is software designed to damage and corrupt computer systems. Its primary objective is to spread within a system rapidly.
How does malware typically enter a computer system?
Malware often enters a computer system when users download something that seems genuine and safe, but the malware is attached to it. This accidental download allows the malware to spread throughout the system.
Why might malware go undetected for long periods even with the right protection methods in place?
Malware might go undetected for extended periods when proper protection methods are in place because it can disguise itself or exploit vulnerabilities. Effective protection methods are crucial for identifying and preventing malware.
In addition to accidental downloads, how else can malware spread from one device to another?
Malware can spread from one device to another via emails, secondary storage (such as USB drives), and shared files.
What are some examples of malware
Examples of malware include viruses, worms, and spyware.
is phishing a new thing?
No,they’ve been around for a long time,but as everything is online now,they have evolved and become very effective for hackers
What is the primary purpose of a phishing scam
to grab confidential and important information from individuals by pretending to be someone they can trust.
Why is the internet mentioned as a platform where phishing scams have become more popular?
The internet is mentioned as a platform where phishing scams have become more popular because people now conduct a wide range of activities online, providing more opportunities for scammers to target individuals.
What is the deceptive approach used in phishing scams to trick individuals?
Phishing scams typically involve pretending to be someone the targeted individual can trust, creating a deceptive approach to entice confidential information.
What is as one of the biggest threats to a network ironically
The people actually using the network themselves
Why might users pose a risk to the network?
Users may pose a risk to the network because they may lack the necessary security knowledge to keep the network safe from threats, thereby putting the network at risk.
What are some dangers that weak security practices by users can pose to a network?
-Leaving computers logged on and unattended.
-Writing passwords down on sticky notes and storing them on desks.
-Sharing passwords with colleagues.
-Not ensuring protection software is up to date.
-Opening email attachments without ensuring they are safe first.
What defines a Brute Force Attack?
A Brute Force Attack involves an automated program persistently trying to access a network by continuously guessing passwords until it successfully gains entry.
How does the automated program in a Brute Force Attack attempt to guess passwords?
The automated program adopts a method of trying various combinations of letters, numbers, and characters, along with testing commonly used passwords like ‘Password’ or the user’s name.