1.4 Network Security Flashcards
What is an active attack
When someone attacks a network with malware
What is a passive attack
The monitoring and interception of data
What is a brute force attack
Passwords are cracked through trial and error
Using software to try every combination
How to defend a brute force attack
Lock after a certain amount of guesses
What is a DOS attack
Denial of Service
The users cannot access a certain part of the network by flooding the network with traffic
Malware
Malicious software that exploits a computer
How can malware enter a computer
Virus
Worms
Trojan
What are viruses
Malware that binds to a certain file and goes onto computer when opened
What are worms
Self-replicating malware
What are Trojans
Malware disguised as legitimate software
What is usually the weak point in secure systems and give an example how
People, shoulder surfing
What is social engineering
Gaining access to a network or information by manipulating people
What is phishing
When people are sent emails or messages claiming to be legitamate and it’s aim is to steal data
Apart from phishing give an example of social engineering
Scam calls
What is an insider attack
Someone who has access to the network exploits it to steal information
What does SQL mean and what is it
Structured Query Language
It is a coding language used to access information in databases
What is an SQL interjection
Using malicious SQL code in a websites input box to reveal sensitive information
7 ways how to prevent malware attacks
Penetration Testing
Physical Secuirty
Passwords
User Access Levels
Anti-Malware
Firewall
Encryption
How does penetration testing keep a network secure
Organisations employ white hat hackers to do an attack on the network and simulate where the weaknesses are
How does physical security keep a network secure
The physical parts of the network are protected through locks and surveillance
How do passwords keep a network secure
Prevent unauthorised users accessing the network
How do user access levels keep a network secure
Which part of the network can be accessed by which users
Limit the number of people with access to important data
How does anti-malware keep a network secure
Stops malware before it can damage a network
Firewalls block unauthorized access
How does encryption
Data is transferred into a code only a key can open
Data can be sent over a network securely