1.4 – Network security Flashcards
what is an acceptable use policy
a document stipulating constraints and practices that a user must agree to for access to a corporate network, the internet or other resources.
what is an AUP used for
prevent users from accessing or confidential data and having unauthorised use of that data
what is penetration testing
where a company pays a hacker to hack there website/database
it is used to find weak points in a company
what is network forensics
involves monitoring the traffic on a network
what is malware
software that is specifically designed to disrupt, damage, or gain unauthorised access to a computer system.
what is a virus
is intended to do harm. It can not spread without human assistance.
what is a trojan horse
a virus that misleads users or its true intent
what is a worm virus
computer program that replicates itself in order to spread to other computers
what is antivirus
a software which scans each file for viruses, when it finds one it quarantines it to stop it spreading
what is a DDOS
multiple systems flood the bandwidth or resources of a targeted system, usually one or more web servers.
When a computer re-quests data from a web page over and over
What is a brute force attack
attacker submitting many passwords or passphrases with the hope of eventually guessing correctly
how to prevent a BFA
lock out accounts after a defined number of incorrect password attempts
what is data interception
a specific type of data theft, referring to information that is captured during transmission
how to prevent data interception
VPN
avoid suspicious links
encryption
cameras
locks
alarms
what is social enjineering
the person is the main weak point in the attack and all techniques are aimed at talking a target into revealing specific information or performing a specific action for illegitimate reasons.