1.4 Network Security Flashcards

You may prefer our related Brainscape-certified flashcards:
1
Q

How are viruses used?

A
  • Self-replicating
  • Dormant until host program is run
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the purpose/effect of viruses?

A
  • Send spam
  • Steal data
  • Infect other computers
  • Corrupt/Delete files
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

How are trojans used?

A
  • Disguised as another legitimate program
  • Can only function if host program is run
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the purpose/effect of trojans?

A
  • Data theft
  • Redirecting search requests
  • Installing other malware
  • Opening a back door for external control over device
  • Used to create botnets for DDoS
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

How are worms used?

A

Replicate and distribute independently

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the purpose/effect of worms?

A
  • Designed to spread quickly
  • May cause no damage
  • DoS
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

How is spyware used?

A
  • Installed without the user’s knowledge
  • Can monitor internet usage
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the purpose/effect of spyware?

A
  • Intends to capture data and relay information to the hacker
  • Keyloggers are used to track key inputs and recognise passwords and sensitive data such as bank details
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

How is ransomware used?

A

Locks computers or encrypts files

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is the purpose/effect of ransomware?

A

The attacker can then demand a fee for the release of files/computer though there is no guarantee of their return

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

How is phishing used?

A
  • Victim receives a message disguised as a reputable source that includes a link
  • Often sent in bulk
  • Uses scare tactics such as “your account has been suspended”
  • Spear phishing is more personal and effective
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is the purpose/effect of phishing?

A
  • Tricks victims into revealing personal details
  • Installs malware on the victim’s device
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

How is pharming used?

A
  • Registering a similar web address to a legitimate one e.g. change of domain
  • DNS poisoning is where the DNS server of a legitimate site is hacked so that when the real web address is entered, the victims are transferred to a fake one
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is the purpose/effect of pharming?

A

Tricks victims into revealing personal details

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

How is blagging used?

A

The attacker attempts to engage in an online conversation with the victim

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is the purpose/effect of blagging?

A

Tricks victims into revealing their personal details

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

How is shoulder surfing used?

A

Physical monitoring of someone e.g. over their shoulder or CCTV

18
Q

What is the purpose/effect of shoulder surfing?

A

To gain PIN or room codes or passwords

19
Q

How is MITM used?

A
  • Hacker connects to a connection between devices
  • Users are unaware of hacked connection
  • Can be done by setting up free unencrypted Wi-Fi
20
Q

What is the purpose/effect of MITM?

A
  • Steal data
  • Alter data for the recipient
21
Q

How is DoS used?

A
  • Sends a server many requests (flooding)
  • DDoS attack comes from a botnet
22
Q

What is the purpose/effect of DoS?

A

Slows down or crashes server

23
Q

How is SQL injection used?

A

Manipulating an SQL query so that additional code can be read by the system

24
Q

What is the purpose/effect of an SQL injection?

A
  • Bypass sign-in systems
  • Extract data
  • Delete data
  • Update data
  • Install data
  • Execute commands
  • Download malware
25
Q

How is brute force used?

A
  • Uses a computer program to generate all possible password combinations and try them out
  • Can use lists of common and cracked passwords first
26
Q

What is the purpose/effect of brute force?

A

Gain access to a victim’s account

27
Q

What attacks are prevented by penetration testing?

A

DoS and SQL injection

28
Q

How does penetration testing work?

A

Weaknesses in current security can be identified and modified accordingly

29
Q

How does anti-malware work?

A

Identifies malware to be removed

29
Q

What attacks does anti-malware prevent?

A

Malware

30
Q

What attacks does a firewall prevent?

A
  • Malware
  • Pharming
  • Blagging
  • Phishing
  • DoS
31
Q

How does a firewall work?

A
  • Can filter malicious packets
  • Prevents hackers from gaining access
  • Malicious websites can be blocked
32
Q

What attacks does user access levels prevent?

A

Malware

33
Q

How do user access levels work?

A

Prevent malware being spread by any user

34
Q

What attacks do strong passwords prevent?

A

Brute force

35
Q

How do strong passwords work?

A

Can stall attack till identified and removed

36
Q

What attack does encryption prevent?

A

MITM

37
Q

How does encryption work?

A

Renders data incomprehensible to hackers without the necessary decryption tools

38
Q

How does physical security work?

A
  • Cover any physical password entries with your hand
  • Check for any suspicious individuals attempting to view your entry
  • Prevents people from viewing your passwords
39
Q

What attacks does physical security prevent?

A

Shoulder surfing