1.6 System Security Flashcards

1
Q

Define malware

A

MALicious softWARE written to infect computers and commit crimes such as fraud and identity theft.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Define virus

A

Malware designed to cause harm to a network or computer.

Most have a human element to them.

Attaches itself to programs or files on a computer or server.

Almost all are attached to an executable file, so the virus may exist on a system; won’t be active or able to spread until a user runs or opens the malicious host file or program.

Often spread through files, programs, emails, messages or games that you download.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Define worms

A

Replicates itself to spread to other computers often using a computer network and fills up the RAM.

To achieve this, the worm exploits vulnerabilities across the computer network.

Unlike a virus, it doesn’t need to attach to a program.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Define trojan horse

A

Users are typically tricked into loading and executing it on their systems.

After it’s activated, it can achieve any number of attacks on the host.

Create back doors to give malicious users access to the system.

Trojans must spread through user interaction such as opening an e-mail attachment or downloading and running a file from the internet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Define network policies

A

How a system can be secured through specific rules or requirements

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Define firewalls

A

Software that performs a “barrier” between a potential attacker and the computer system.

Can be held on a server, or a standalone computer.

Many have this feature as part of an anti-virus package.

Not 100% effective – an attacker could exploit a vulnerability.

Monitors applications and network usages.

Can block access from certain computer users and disable processes which may be perceived as a threat.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Define penetration testing

A

Tests performed under a controlled environment by a qualified person.

Checks for current vulnerabilities and explores potential ones in order to expose weaknesses in the system so they can’t be maliciously exploited.

May use tools to help them in their duties.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Define penetration testing

A

Tests performed under a controlled environment by a qualified person.

Checks for current vulnerabilities and explores potential ones in order to expose weaknesses in the system so they can’t be maliciously exploited.

May use tools to help them in their duties.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

How can you prevent malware?

A

1) Strong security software (firewall, spam filter, anti-virus, anti-spyware, anti-spam).
2) Enable OS updates.
3) Staff training: caution opening attachments.
4) Back up files regularly.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Define social engineering

A

Relies on human interaction (social skills).

Commonly involves tricking users into breaking normal security procedures.

Method doesn’t revolve around technical cracking techniques such as: worms or viruses.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Define phishing

A

Form of social engineering.

Designed to acquire sensitive information such as: usernames, passwords, card details etc.

Most common phishing attacks are sent through email.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are the effects of phishing?

A

1) Accessing a victim’s account and withdraw money or purchase merchandise or services.
2) Open new bank or credit-card accounts in a victim’s names, and use the new account to cash illegitimate checks or purchase merchandise.
3) Gaining access high-value corporate data.
4) Financial services can blacklist institutions, resulting in reputational damage.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

How can you prevent phishing?

A

1) Strong security software (firewall, spam filter, anti-virus, anti-spam).
2) Staff training: awareness of spotting fake websites & amp; emails.
3) Staff training: never disclose personal or financial information.
4) Staff training: disable pop-ups.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Define brute force attack

A

1) Strong security software (firewall, spam filter, anti-virus, anti-spam).
2) Staff training: awareness of spotting fake websites & amp; emails.
3) Staff training: never disclose personal or financial information.
4) Staff training: disable pop-ups.

4

14
Define brute force attack

Trial and error method used by programs to decode encrypted data such as: passwords or Data Encryption Standard (DES) keys, through exhaustive effort rather than employing intellectual strategies.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are the effects of brute force attack?

A

1) Theft of data.

2) Access to corporate systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

How can you prevent brute force attacks?

A

1) Network lockout policy: locks out after number of tries expires.
2) Effective software: progressive delays.
3) Staff training: using effective passwords that contain symbols and numbers.
4) Challenge response tests e.g. reCAPTCHA

17
Q

Define denial of service attack

A

Flooding a server with useless traffic causes servers to become overloaded preventing them responding to legitimate client-server requests from users.

18
Q

Flooding a server with useless traffic causes servers to become overloaded preventing them responding to legitimate client-server requests from users.

A

1) Revenue losses: downtime affects profits.
2) Productivity Loss.
3) Reputation Damage.

19
Q

How can you prevent denial of service attacks?

A

1) Strong security software (firewall).
2) Packet filters on routers.
3) Configuration of the web server.
4) Good network policy: audits, logs, monitoring.

20
Q

Define data interception and theft

A

An attacker monitors data streams to/from a target, in order to gather sensitive information.

21
Q

What are the effects of data interception and theft?

A

1) Discovering username and password credentials.
2) Gaining access to systems.
3) Disclosure of corporate data.
4) Theft of data.

22
Q

How can you prevent data interception and theft?

A

1) Strong encryption.
2) Using virtual networks.
3) Staff training: use of passwords, locking and portable storage devices.
4) Network forensics.

23
Q

Define SQL injection

A

A code injection technique, used to attack data-driven applications

24
Q

What are the effects of SQL injection?

A

1) Contents of the database can be output, revealing data that otherwise would be hidden.
2) Data in the database can be amended and deleted.
3) New rogue records can be added.

25
Q

How can you prevent SQL injection?

A

1) Validation of input fields.
2) Using parameterised queries.
3) Using database permissions.
4) Penetration testing.