1.4 Network Security Flashcards
What is malware?
Malware is a type of program that can replicate itself and cause a computer to malfunction.
List different malware.
Virus, worms, ransomware, spyware, root kits, Trojan horses, and back doors.
List some measures to prevent malware attacks.
Installing anti-virus software, backing-up a system in off-site mode, updating operating systems and browsers and avoiding downloads of email attachments from unknown senders.
What is phishing?
Phishing is a type of attack to obtain security-related information such as passwords by disguising as a trustworthy entity through electronic communication.
How are phishing emails filtered?
Email service providers filter phishing emails
What is a Denial of Service (DoS) attack?
Denial of Service attacks prevent a user from accessing part of a network.
In what ways do attackers intercept and steal data?
By using hijacking software and pretending to be the destination across the network. Also, by using packet sniffing software.
What does packet sniffing software do?
Packet sniffing software examines data packets in a certain route and by using a network switch an attacker manages to examine all the data packets at a certain IP address.
How can a user defend himself against brute-force attacks?
Using long passwords with lowercase, uppercase, numbers and special characters.
What are the steps involved in penetration testing?
Identifying a vulnerability
Setting up an attack
Carrying out the attack
Testing the ability of the system to recover any lost or corrupted data
List some of the functions of a firewall.
Checks whether the incoming and outgoing data meet the set of requirements.
Prevent malware, hackers and DoS attacks.
What is an incident response plan?
In case of a security failure, a plan is established to recover from it, which is called an incident response plan.
List some areas covered by network policies.
Acceptable use policy, archiving, passwords, email, web, remote access, wireless network, servers and incident response plan.
What is ethical hacking?
Ethical hacking is the process of analysing the weakness in network and security vulnerabilities with organisation’s knowledge.
What is gateway?
A hardware that acts as firewall is called gateway.
How is a system protected from keyloggers?
Systems ask the user to enter only a certain characters of the password to protects the system from keyloggers.
What is proxy server?
A proxy server is a server installed between user’s computer and web server, acts as a firewall.
How does proxy server provide security?
Use of proxy server ensures that only safe websites are visited. Access to certain websites can be blocked. Proxy server hides the IP address of user to enhance security.
List some security protocols.
Secure Sockets Layer (SSL) and Transport Layer Security (TLS)
What is hashing algorithm?
A hashing algorithm converts a text message into a string of hexadecimal characters.