1.4 Network Security Flashcards
How are viruses used?
- Self-replicating
- Dormant until host program is run
What is the purpose/effect of viruses?
- Send spam
- Steal data
- Infect other computers
- Corrupt/Delete files
How are trojans used?
- Disguised as another legitimate program
- Can only function if host program is run
What is the purpose/effect of trojans?
- Data theft
- Redirecting search requests
- Installing other malware
- Opening a back door for external control over device
- Used to create botnets for DDoS
How are worms used?
Replicate and distribute independently
What is the purpose/effect of worms?
- Designed to spread quickly
- May cause no damage
- DoS
How is spyware used?
- Installed without the user’s knowledge
- Can monitor internet usage
What is the purpose/effect of spyware?
- Intends to capture data and relay information to the hacker
- Keyloggers are used to track key inputs and recognise passwords and sensitive data such as bank details
How is ransomware used?
Locks computers or encrypts files
What is the purpose/effect of ransomware?
The attacker can then demand a fee for the release of files/computer though there is no guarantee of their return
How is phishing used?
- Victim receives a message disguised as a reputable source that includes a link
- Often sent in bulk
- Uses scare tactics such as “your account has been suspended”
- Spear phishing is more personal and effective
What is the purpose/effect of phishing?
- Tricks victims into revealing personal details
- Installs malware on the victim’s device
How is pharming used?
- Registering a similar web address to a legitimate one e.g. change of domain
- DNS poisoning is where the DNS server of a legitimate site is hacked so that when the real web address is entered, the victims are transferred to a fake one
What is the purpose/effect of pharming?
Tricks victims into revealing personal details
How is blagging used?
The attacker attempts to engage in an online conversation with the victim
What is the purpose/effect of blagging?
Tricks victims into revealing their personal details
How is shoulder surfing used?
Physical monitoring of someone e.g. over their shoulder or CCTV
What is the purpose/effect of shoulder surfing?
To gain PIN or room codes or passwords
How is MITM used?
- Hacker connects to a connection between devices
- Users are unaware of hacked connection
- Can be done by setting up free unencrypted Wi-Fi
What is the purpose/effect of MITM?
- Steal data
- Alter data for the recipient
How is DoS used?
- Sends a server many requests (flooding)
- DDoS attack comes from a botnet
What is the purpose/effect of DoS?
Slows down or crashes server
How is SQL injection used?
Manipulating an SQL query so that additional code can be read by the system
What is the purpose/effect of an SQL injection?
- Bypass sign-in systems
- Extract data
- Delete data
- Update data
- Install data
- Execute commands
- Download malware
How is brute force used?
- Uses a computer program to generate all possible password combinations and try them out
- Can use lists of common and cracked passwords first
What is the purpose/effect of brute force?
Gain access to a victim’s account
What attacks are prevented by penetration testing?
DoS and SQL injection
How does penetration testing work?
Weaknesses in current security can be identified and modified accordingly
How does anti-malware work?
Identifies malware to be removed
What attacks does anti-malware prevent?
Malware
What attacks does a firewall prevent?
- Malware
- Pharming
- Blagging
- Phishing
- DoS
How does a firewall work?
- Can filter malicious packets
- Prevents hackers from gaining access
- Malicious websites can be blocked
What attacks does user access levels prevent?
Malware
How do user access levels work?
Prevent malware being spread by any user
What attacks do strong passwords prevent?
Brute force
How do strong passwords work?
Can stall attack till identified and removed
What attack does encryption prevent?
MITM
How does encryption work?
Renders data incomprehensible to hackers without the necessary decryption tools
How does physical security work?
- Cover any physical password entries with your hand
- Check for any suspicious individuals attempting to view your entry
- Prevents people from viewing your passwords
What attacks does physical security prevent?
Shoulder surfing