1.4 Network Security Flashcards
What is malware?
Malware is a type of program that can replicate itself and cause a computer to malfunction.
List different malware.
Virus, worms, ransomware, spyware, root kits, Trojan horses, and back doors.
List some measures to prevent malware attacks.
Installing anti-virus software, backing-up a system in off-site mode, updating operating systems and browsers and avoiding downloads of email attachments from unknown senders.
What is phishing?
Phishing is a type of attack to obtain security-related information such as passwords by disguising as a trustworthy entity through electronic communication.
How are phishing emails filtered?
Email service providers filter phishing emails
What is a Denial of Service (DoS) attack?
Denial of Service attacks prevent a user from accessing part of a network.
In what ways do attackers intercept and steal data?
By using hijacking software and pretending to be the destination across the network. Also, by using packet sniffing software.
What does packet sniffing software do?
Packet sniffing software examines data packets in a certain route and by using a network switch an attacker manages to examine all the data packets at a certain IP address.
How can a user defend himself against brute-force attacks?
Using long passwords with lowercase, uppercase, numbers and special characters.
What are the steps involved in penetration testing?
Identifying a vulnerability
Setting up an attack
Carrying out the attack
Testing the ability of the system to recover any lost or corrupted data
List some of the functions of a firewall.
Checks whether the incoming and outgoing data meet the set of requirements.
Prevent malware, hackers and DoS attacks.
What is an incident response plan?
In case of a security failure, a plan is established to recover from it, which is called an incident response plan.
List some areas covered by network policies.
Acceptable use policy, archiving, passwords, email, web, remote access, wireless network, servers and incident response plan.
What is ethical hacking?
Ethical hacking is the process of analysing the weakness in network and security vulnerabilities with organisation’s knowledge.
What is gateway?
A hardware that acts as firewall is called gateway.