1.4 Network Security Flashcards
What is the purpose of network security?
The purpose of network security is to protect a network and its data from threats such as unauthorized access, hacking, and data breaches.
What is malware?
Malware is malicious software designed to disrupt, damage, or gain unauthorized access to computer systems or networks.
Name three common types of malware.
Three common types of malware are viruses, worms, and Trojan horses.
What is a virus?
A virus is a type of malware that attaches itself to legitimate programs or files, spreading to other systems when the infected file is executed.
What is a worm?
A worm is a type of malware that replicates itself to spread to other computers without needing to attach to a program.
What is a Trojan horse?
A Trojan horse is a type of malware disguised as a legitimate program, which, once executed, allows attackers to gain unauthorized access to the system.
How does a firewall contribute to network security?
A firewall monitors and controls incoming and outgoing network traffic, allowing only authorized traffic based on security rules.
What is encryption in the context of network security?
Encryption is the process of converting data into a code to prevent unauthorized access during transmission over a network.
What is a Denial of Service (DoS) attack?
A Denial of Service (DoS) attack overwhelms a network or website with excessive traffic, causing it to crash and become unavailable to users.
What is the difference between a DoS attack and a Distributed Denial of Service (DDoS) attack?
A DDoS attack involves multiple computers working together to launch a DoS attack, making it harder to stop compared to a single-source DoS attack.
What is phishing?
Phishing is a social engineering attack where attackers attempt to deceive individuals into providing sensitive information, such as passwords or credit card details, by impersonating a trustworthy entity.
How can phishing be prevented?
Phishing can be prevented by being cautious of unsolicited emails or messages, not clicking on suspicious links, and using spam filters.
What is two-factor authentication (2FA)?
Two-factor authentication (2FA) is a security process that requires users to provide two forms of identification before gaining access to an account or system.
What is an Intrusion Detection System (IDS)?
An Intrusion Detection System (IDS) monitors network traffic for signs of suspicious activity or potential threats and alerts administrators.
What is a VPN (Virtual Private Network), and how does it enhance network security?
A VPN encrypts internet traffic and routes it through a secure server, making it difficult for hackers to intercept data and ensuring privacy.
What is the role of antivirus software in network security?
Antivirus software detects, removes, and protects against malicious software (malware) such as viruses, worms, and trojans.
What is a brute-force attack?
A brute-force attack is a method of trying many passwords or encryption keys to gain unauthorized access to a system.
What is a botnet?
A botnet is a network of compromised computers controlled by an attacker, often used to launch attacks like DDoS.
How does multi-factor authentication (MFA) differ from two-factor authentication (2FA)?
MFA requires two or more types of verification factors (such as passwords, biometrics, and tokens), while 2FA only requires two.
What is a vulnerability scan?
A vulnerability scan is an automated tool that checks a system or network for known security weaknesses or vulnerabilities.
What are some best practices for improving network security?
Best practices include using strong, unique passwords, enabling firewalls, encrypting sensitive data, regularly updating software, and using antivirus software.