1.4: NETWORK SECURITY TRE fin Flashcards

1
Q

what are spyware and keyloggers and how are they prevented?

A

software that hides on your computer and records your keystrokes to send to a third party for analysis

this can be stopped by anti malware software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

what are viruses and how can they be prevented?

A

a program installed on your computer that is designed to replicate itself
it can harm files and spread to other computers and devices

they can be prevented by antivirus/anti malware software and by not clicking on links from unknown sources

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

what are denial of service attacks and how can they be prevented?

A

servers and devices are flooded with too many requests or data packets, causing them to crash or become unusable

they can be prevented by a firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

what are brute-force attacks and how can they be prevented?

A

automated or manual attempts to gain unauthorised access to secure areas
>by trying lots of password combinations

these can be prevented by strong passwords with limited attempts and by penetration testing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

what is blagging and how can it be prevented?

A

dishonestly persuading someone to divulge personal or sensitive information by deception

this can be prevented by security training

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

what is phishing and how can it be prevented?

A

redirecting a user to a fake website where they trick them into divulging information such as passwords for fraudulent use

this can be prevented by network policies, firewalls or being aware of phishing clues

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

what is shouldering and how can it be prevented?

A

looking over someone’s shoulder as they enter a password

this can be prevented by concealing the password entry, user access levels (eg 2 factor authentication) and user awareness

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

what is data interception and theft and how can it be prevented?

A

data may be intercepted during transmission, but physical theft can occur when storage devices or data files are left insecurely

this can be prevented by encryption, physical locks and biometrics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

what is an SQL injection?

A

STRUCTURE QUERY LANGUAGE

used to search databases

when data is entered like username and password, the website will contact the database server to find the account details and display them
HOWEVER
if a hacker enters malicious SQL into the password field, this will modify the SQL executed, resulting in unauthorised access

eg they might type in 1=1 and be let in

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

what is penetration software?

A

used to find weaknesses in a system by hiring someone to try and hack into it before a hacker does

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

what is external pen testing?

A

trying to find a way into a system form outside the organisation, like servers and firewalls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

what is internal pen testing?

A

putting the tester in the position of an employee who has some access into the system to test the damage they could cause

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

what is anti malware software?

A

it protects a computer by preventing harmful programs from being installed

if a virus is detected, the software will quarantine and remove the file

it should be constantly kept up to date to detect all recent threats

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

what is a firewall?

A

prevent unauthorised access to the computer

all data traffic is monitored as it passes through the firewall, meaning external attacks and banned websites can be blocked

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

what are user access levels?

A

different access can be given to each employee based on their needs

this limits the amount of data that a hacker may be able to see if an account is compromised

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

what is physical security?

A

locks on doors and servers

biometrics as unique physical keys

17
Q

which forms of attack are malware?

A

spyware and keyloggers
viruses

18
Q

which forms of attack are social engineering?

A

blagging
phishing

19
Q

which forms of attack are hacking?

A

brute force attacks
denial of service attacks