1.4 Network Security Flashcards

1
Q

What is malware

A

Malicious software thats designed to hack a system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is a virus and describe it

A

Programs embedded within other files. They replicate and become part of other programs. They often cause damage by deleting or modifying data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

An example of a virus and describe it

A

May 2000 - ILOVEYOU virus shut down email servers of several major corporations eg = Microsoft & ford. After around 10 days around 45 million users had been affected and approximately $10 billion had been caused in damages

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What’s a worm and describe it

A

Programs similar to viruses except they’re not hidden within other files. They often spread through emails

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

An example of a worm and describe it

A

2004 - Mydoom caused more than $38 billion worth of damage. It was a mass mailing computer worm that stole email addresses from infected computers and sent itself to those addresses.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What’s a Trojan and describe it

A

Programs that pretend to be legitimate but are actually malware. Often they’re disguised as email attachments. They cant be spread by themselves instead they deceive a user into installing the program

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Example of a Trojan and describe it

A

Emotet malware infected more than 1.6 million computers and caused hundreds of millions of dollars in damage worldwide. It infects computers through spam emails containing hyperlinks or malicious attachments. Emails appeared to be from legitimate sources or the persons contact list

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What should a good password include

A
  • A mix of upper and lower case letters
  • numbers
  • special characters
  • a reasonable length (between 8 and 12 characters)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What’s penetration testing (pen)

A
  • Tests performed under a controlled environment by a qualified person.
  • the person checks for current vulnerabilities and explores potential ones to expose weaknesses in the system so they cant be maliciously exploited
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What’s anti-malware software

A

Software that aims to prevent malware from entering the system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What’s a firewall

A

Software that acts as a barrier between a potential attack and the computer system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are user access levels

A
  • They allow administrators to set up a hierarchy of users
  • lower level users have access to limited information and settings
  • higher level users have access to the most sensitive data on the system
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is two-factor authentication

A

A randomised code that also needs to be entered when trying to log in to a software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What’s encryption

A

Data’s scrambles before transmission so only authorised users/users with he key can decrypt it. Users need the key to decrypt the coded file

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

How does Caesar cipher work

A

It encrypts messages through movement of each letter a certain number of places to the left in the alphabet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are biometrics

A

Any human characteristic (eg = retina scan, fingerprints, voice or face recognition)

17
Q

What are other methods of physical security

A

Door locks, window locks or bars, intruder alarms, cctv systems, laptop locks, security guards

18
Q

What’s social engineering

A

An online fraud technique designed to give away personal info. It’s normally in the form of an email that tries to deceive a user into clicking a link that looks like a real website

19
Q

Example of social engineering

20
Q

How to prevent social engineering

A

User awareness education - dont click on unknown links

21
Q

What’s a brute force attack

A

A trial and error method used to decode a password by trying all the possible combinations of characters until the right one is found

22
Q

How to prevent a brute force attack

A

Strong passwords
Set number of password attempts

23
Q

What’s a denial of service (DoS) attack

A

Flooding a server with requests over and over again until it’s unavailable or overloaded

24
Q

How to prevent a DoS attack

25
Q

What is data interception and theft

A
  • Data is intercepted as it travels over a WAN as it uses telecommunication infrastructure
  • data theft - data is intercepted physically
26
Q

What is an example of data theft

A

Portable hard drives and other hardware can be stolen

27
Q

How to prevent data interception

A

Encryption

28
Q

How to prevent data theft

A

Biometrics, physical looks

29
Q

What is an SQL injection

A

A code injection technique used to attack data driven applications
OR
It’s code written in an input on a data field

30
Q

How to prevent an SQL injection

A

Validation access levels, penetration testing