1.4 Network Security Flashcards
What are the types of network attacks?
- Data interception and theft
- Brute-force
- Denial of Service (DoS)
- SQL injection
- Malware
- Phishing -> social engineering
Data interception and theft
Sensitive information travelling on a network is intercepted using monitoring hardware and software like packet sniffers
Brute-force
Automated software is used to try millions of potential passwords until one works
Denial of Service (DoS)
Hacker prevents users from accessing a network or website by flooding it with useless traffic/requests
SQL injection
SQL code typed into input boxes on a website -> can gain access to databases behind the website if it doesn’t have strong input validation
Malware
Software designed to damage or disrupt a device or network
Types of malware
- Spyware
- Scareware
- Ransomware
- Rootkit
- Viruses
- Worms
- Trojans
Spyware
Monitors user actions and sends info to the hacker
Scareware
Tricks user into paying to fix fake problems
Ransomware
Encrypts files. User pays for decryption key
Rootkit
Gives hackers admin access to the system
Viruses
Attached to other files. Only run or replicated when the file is opened
Trojans
Malware disguised as legitimate software. Do not replicate themselves.
Social Engineering
Gaining access to networks or sensitive information by using people as a system’s weak point
Phishing
Hackers impersonate well-known businesses sending emails or messages to you. They contain links to fake websites that ask users to update their personal information, which the criminal steals.
Passwords
Prevent unauthorised users from accessing a network. They should be strong and changed regularly to protect against brute-force attacks.
Encryption
- Data translated into a code that needs a specific decryption key to access
- Limits the effectiveness of data interception attacks and SQL injections
User access levels
It can control:
- Who has access to sensitive data
- Who has read/write access to files
- Who can change access levels of other users
How can user access levels prevent network attacks?
Limits the number of people who can access sensitive data and important files -> makes social engineering and malware attacks less effective
Anti-Malware Software
Prevents malware from damaging a network and the devices on it
Firewalls
- Examine all data entering and leaving a network
- Identify threats using a set of security rules, blocking unauthorised access and unwanted data
- Protect against most types of attack
Physical Security
Protects physical parts (like servers) of a network from damage
- Locks and passcodes -> restrict access to areas like server rooms
- Surveillance -> equipment can deter intruders
Penetration Testing
- Hire specialists to stimulate attacks -> identify and report network security weaknesses.
- Weaknesses can be fixed to help to protect against real network attacks