14- Threats to computer systems and networks Flashcards

1
Q

What are the different ways a network can be hacked?

A
malware
phishing
brute force
denial of service
data interception and theft
structured query language injection
poor network policy
people
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is malware?

A

Malware is malicious software that is designed to hack a system. Malware can take many different forms.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What different forms can malware take place as?

A

Viruses, worms, trojans, spyware and ransomware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are viruses?

A

Programs embedded (hidden) within other files. They replicate themselves and become part of other programs. Viruses often cause damage by deleting or modifying data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are worms?

A

Programs similar to viruses except that they are not hidden within other files. Worms often spread through emails.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are trojans?

A

Programs which pretend to be legitimate but in reality are malware. They are often disguised as email attachments. Trojans cannot spread by themselves - instead they deceive a user into installing the program

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is spyware?

A

Programs that monitor user activities (such as websites visited, usernames and passwords used) and send the information back to a hacker.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is ransomware?

A

Programs that attempt to blackmail a user into making a payment to a hacker. Some types of ransomware do little but try to scare users into paying, while others go further - they encrypt documents and will not decrypt them until a ransom is paid.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is phishing?

A

Emails that try to trick users into giving away personal details. The phishing email pretends to be a genuine message and tries to deceive the user into following a link to a website that looks like the real company, for example, a bank. However, it is a fake website designed to catch data such as bank account numbers and security codes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is a brute force attack?

A

Where a program is used to find a password by trying all possible combinations of characters until the correct one is obtained.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is a Denial of service attack?

A

Where a computer (or many computers) is used to prevent a server from performing its tasks. This is done by bombarding the server over and over again with requests. Eventually the server is tied up trying to handle all the DOS requests, making it very difficult for it to respond to legitimate requests.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is Data interception and theft

A

Where data is intercepted during transmission. This is done using software called a packet sniffer, which examines data packets as they are sent around a network, or across the internet. The information gathered is sent back to a hacker.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is SQL injection?

A

SQL is used to search databases. A hacker can enter some malicious SQL into a database, which can cause errors or unintended operations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is poor network policy?

A

Where a network does not have security rules in place for users to follow.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

How are people a threat to networks?

A

Where users do not adhere to network policy. People frequently ignore rules, or accidentally or deliberately break them. For example, many users choose easy to guess passwords, or send and receive personal emails which may contain viruses. This behaviour increases the chances of a network being compromised and its data being accessed by unauthorised users. This is sometimes called social engineering.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What do poor network policies tend to not have?

A
  • levels of access to prevent users from accessing sensitive data unless they are authorised to do so
  • rules preventing the connection of external devices such as USB memory sticks which may contain and transmit viruses
  • regulation regarding secure passwords, for example using a number of letters, numbers and symbols
  • rules to govern what websites can and cannot be visited
  • methods to prevent any user wirelessly connecting an unsecured laptop, tablet or smartphone
  • controls on what facilities can be accessed remotely (away from the organisation)
  • a formal backup procedure that is adhered to
  • a regular maintenance programme that is followed
17
Q

What is a network attack?

A

an attempt to gain access to, steal, modify or delete data on a network.

18
Q

What are the 4 types of network attack?

A

active, eavesdropping(passive), external, internal

19
Q

What methods are in place to help keep a network safe?

A

secure passwords
encryption
anti-malware software
firewalls

20
Q

Describe penetration testing

A

The purpose of penetration testing is to determine how resilient a network is against an attack. It involves authorised users (sometimes an external party or organisation) who probe the network for potential weaknesses and attempt to exploit them. Software that enables network managers to test the resilience of networks themselves is also available.

21
Q

Describe network forensics

A

Network forensics involves monitoring the traffic on a network. At regular intervals transmitted data packets are copied. The copy and information about the packet are then stored for later analysis. This is usually processed in batches. The information gathered can help identify invasive traffic (from hackers) or to determine where data is being sent.

22
Q

What is meant by network policies?

A

Rules put in place that ensure the safety of a network

23
Q

What do network policies ensure?

A
  • users have a secure, hard-to-guess password which meets specified conditions
  • users change their password on a regular basis
  • users cannot connect unauthorised equipment to the network, such as USB memory sticks, smartphones and tablets
  • levels of access are given, which allow only authorised users to access sensitive data
  • a regular backup procedure is in place
  • a disaster recovery procedure exists in case of data loss
  • regular penetration testing and forensic analysis
  • regular maintenance including applying software upgrades and security patches to equipment
  • preventing physical access to servers
  • maintaining a high level of security with up-to-date anti-virus software and firewalls
24
Q

What do user access levels do?

A

They determine the facilities a user has access to e.g. software, email, internet access, documents & data, the ability to install and/or remove software, the ability to maintain other users’ accounts.

25
Q

-

A

-

26
Q

What methods are in place to identify vulnerabilities in a network?

A

penetration testing, network forensics, network policies, user access levels

27
Q

What is the purpose of a password?

A

The purpose of a password is to verify who a user is. Without knowing the password, you cannot use a user ID to sign into a network.

28
Q

What is an ideal secure password?

A

One that contains a combination of upper an lower case letters, special characters and numbers. The password should also be at least 8 characters long and not be easy to guess.

29
Q

What is encryption?

A

the process of disguising data so that it cannot be understood. Even if a hacker gains access to encrypted data, they will not be able to understand it, as they do not have the key to turn the message from ciphertext to plaintext.

Network managers usually encrypt data which is to be stored or transmitted on a network.

30
Q

What are the 3 purposes of anti-malware?

A
  • To detect malware that has been installed
  • To prevent malware from being installed
  • To remove malware from the system.
31
Q

What does anti-malware include?

A

anti-virus software, anti-phishing tools and anti-spyware software

32
Q

How does anti-malware work?

A

by scanning through all the files on a computer and checking them against a list (known as definitions) of known malware.

33
Q

What is the main problem with anti-malware?

A

that it is reactive - it can only detect, prevent and remove known malware. When new malware is introduced, anti-malware has to be updated to take account of the new threats. The longer the gap before anti-malware is updated, the less protection it offers.

34
Q

What does a firewall do?

A

A firewall stops unauthorised traffic entering and leaving a network.

35
Q

The decision for a firewall to allow or block traffic is based on what?

A

The firewall policy

36
Q

What is an example of the firewall policy in use?

A

some programs, such as email clients and web browsers have legitimate cause to send a transmission. These programs are known and the firewall policy allows their communications. However, any transmissions that are not sent from or to known - and allowed - sources are blocked.

37
Q

What are the 2 things firewalls can be?

A

Hard-ware based or soft-ware based

38
Q

Which is more expensive, hardware-based firewalls or soft-ware based firewalls?

A

Hard-ware based firewalls

39
Q

Which is more effective, hardware-based firewalls or soft-ware based firewalls?

A

Hard-ware based firewalls