1.6 System Security Flashcards
What is a Passive attack?
Network traffic is monitored and then data is intercepeted
How can you prevent a passive attack?
Encryption can encrypt the intercepted data and the unauthorised user cannot access it
What is an Active attack?
Someone deliberately attacks a network with malware
How can you prevent an Active attack?
Use an firewall and an antivirus software
What is an Insider attack?
Someone with network access abuses this to steal information
How can you prevent an Insider attack?
User access levels to control how much data people can access
What is a Brute force attack?
When an user cracks a password using trial and error
How can you prevent a Brute Force attack?
Locking accounts after failed attempts after a certain number of times
What is DDOS attack?
When a network is flooded with useless data so it crashes
How can you prevent a DDOS attack?
A firewall can prevent it
What is SQL injection?
SQL commands are typed on a website database
How can you prevent a SQL injection?
Having strong validation on all input boxes?
What is Phishing?
Emails with links that trick people
How can you prevent Phishing?
Looking for signs that an email is not from a real company
What is Social engineering?
When a person manipulates someone into handing information?
How can you prevent social engineering?
Policies and rules for staff about handing over data
What is Malware?
Malicious software intended to cause harm
What is penetration testing?
Organizations employ professionals to try and hack their networks so that they can find areas of weakness
What are User Access Levels?
Different employees have different levels of access to programs websites and data
What is Encryption?
When data is scrambled and can only be decrypted with a specific key
What is Network Forensics?
Data packets are captured as they enter the network and are analysed
What are Network Policies?
Policies are used to reduce the risks on networks
What is a virus?
Programs hidden within other programs, replicate themselves
Cause damage by deleting or modifying data
What are worms?
Copy themselves without the user doing anything
They are usually spread through emails
What are Trojans?
Programs which pretend to be legitimate but in reality are malware
Trojans cannot spread by themselves
Deceive a user into installing the program
What is Ransomware?
Programs that attempt to blackmail a user into making a payment to a hacker or unauthorized group
What is an external attack?
Where someone outside of an organization attempts to hack into a network?
What is the cipher text?
Encrypted text
What is plain text?
Data that has not been encrypted is called plain text
What is Asymmetric encryption?
An algorithm that generates two keys - a public key and a private key
What is the purpose of the public key?
To encrypt a message