1.4 Network security Flashcards

1
Q

Malware

A

Software that damages/deletes data
Can be prevented using encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Viruses

A

A type of malware which is installed without your knowledge.
It is a program that embeds itself in other programs infecting them
It can then spread to other users and computers if an infected file is sent to someone else.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Worms

A

A standalone program that does not need to attach itself to an existing program to spread.
It may scan the internet automatically looking for other computers to infect.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Trojans

A

A program which masquerades as having one legitimate purpose but has another.
Normally spread by email where the user is invited to click on a link for some routine or interesting purpose which then executes a program which may give the controlled unauthorised access to that computer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Social Engineering

A

Tricking or persuading individuals into revealing confidential or personal information such as passwords or bank details.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Phishing

A

Emails designed to steal money, get login details or steal identity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Brute-Force Attacks

A

A program attempting all possible password combinations
Can be prevented using a strong password or a set number of password attempts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Data Interception and Theft

A

Data interception is where data that has been transmitted has been read by an unauthorised user or program
Difficult to prevent interception but the data can be protected using encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Denial of Service Attacks

A

DoS attacks are an attempt to prevent legitimate users from accessing a website.
One method used is to flood a company’s network with useless traffic.
The network will soon become overloaded and can crash or appear unresponsive.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

The Concept of SQL Injection

A

A technique that exploits security weaknesses in a website
It achieves this by inserting malicious code into a database field on a website.
Such attacks can be used to corrupt or disable targeted websites or spread viruses and other malware.
They may also be designed to steal information such as credit card numbers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Penetration Testing

A

Testing that is used to find any security weaknesses in a system.
The strategy is to gather information about the target of possible attacks, identify possible entry points, attempt to break in and report back findings.
An external penetration test could target email servers, web servers or firewalls.
An internal penetration test puts the tester in the position of an employee with standard access rights, to determine how much damage a disgruntled or dishonest employee could cause.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Anti-Virus

A

Identifies viruses
Compares data to a database of spyware
Alerts user and requests actions
Deletes spyware
Stops the download of spyware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Anti-Malware Software

A

Identifies viruses/spyware/malware
Compares data to a database of malware
Alerts users and requests actions
Deletes viruses/malware
Stops the download of viruses/malware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Firewalls

A

Scans incoming and outgoing traffic
Compares traffic to a criteria
Blocks traffic that is unauthorised
Blocks incoming/outgoing traffic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

User Access Levels

A

Data can be read/write/read-write
Prevents accidental changes
Limits data users can access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Passwords

A

Code/fingerprint must be correctly entered to gain access
Strong passwords need to be used that are unique to the individual
Strong passwords make it harder for a brute-force attack to succeed
If passwords are entered incorrectly after a set number of attempts, the user is locked

15
Q

Encryption

A

Scrambles data using an algorithm
If encrypted data is intercepted, it cannot be understood
A key is needed to decrypt data

16
Q

Physical Security

A

Examples of physical security include locks, key card entry, biometry entry to a room, passcode entry to a room, alarms, security guards and CCTV

17
Q

Two-Step Authentication

A

A code is sent to user’s separate device
Unauthorised person will need access to this device as well