1.4 Network Security Flashcards

1
Q

Encryption

A

The process of scrambling data so that it cannot be understood by anyone, but its intended recipient. It requires the use of a secret key to covert encrypted messages (Ciphertext) into unencrypted messages (Plaintext).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Symmetric Encryption

A

Uses just one key to hide and read a message. If this key becomes public then all messages can be unlocked.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Asymmetric Encryption - Public & Private Keys

A

Generates two keys – a public key and a private key. A public key can be given to anyone, but cannot decrypt a message - only the private key can do that. So long as the private key is never given out, messages will stay safely encrypted.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Malware

A

Hostile/intrusive software used to infect computers and commit crimes (fraud, identity theft).
E.g. Viruses: Programs that are installed on computers designed to replicate itself, causing harm to data.

Identifying and Preventing:
Anti-malware software.
Firewalls.
Enabling software updates.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Social Engineering

A

Exploiting the fact that people are weak points in secure systems.
E.g. Phishing: Emails that redirect a user to a fake website to trick the reader into giving confidential information( passwords) that can be used fraudulently.

Identifying and Preventing:
Staff training – awareness of spotting fake emails and websites/not disclosing personal information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Brute-force attacks

A

Trial an error methods used to decode encrypted data such as passwords and keys. It uses exhaustive effort to attempt to discover these sensitive details.

Identifying and Preventing:
Network lockout policy – locks account after 3 password attempts.
Strong passwords.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

SQL (Structured Query Language) Injection

A

A code injection technique used to attack data driven applications. Makes use of vulnerabilities in poorly coded database applications.

Identifying and Preventing:
Penetration testing – running a ‘fake’ hack to discover and exploit any vulnerabilities.
User access levels.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Data interception and thef

A

An attacker monitoring data streams to and from a target in order to gather sensitive information.

Identifying and Preventing:
Encryption.
Physical security e.g. biometrics, locks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Distributed denial of service attacks (DDoS)

A

Flooding a network with useless traffic causing it to become overloaded and not respond normally.

Identifying and Preventing:
Firewalls – Software that monitors and filters traffic of a network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q
A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly