1.6: System Security - YK Flashcards

1
Q

What is malware?

A

Malicious software - any software designed to cause harm to a user or computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the different types of malware?

A

Virus: software that copies itself from machine to machine, causing harm as it goes
Trojan Horse: malware disguised as something beneficial which causes damage once downloaded
Spyware: malware that records/transmits keys pressed to record passwords or personal information entered
Ransomware: locks a machine and its files until money (a ransom) is paid

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is SQL injection?

A

Malicious code entered into a form on a website attempting to change the SQL statement going to the server, potentially giving the hacker access to unauthorised data from the database and the ability to delete/modify data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is phishing?

A

Sending an email/text pretending to be a reputable source, with a link to enter personal details or passwords

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is a brute force attack?

A

Guessing every possible combination for a PIN or password until the correct one is found

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is a Denial of Service attack (DoS and DDoS)?

A

When a web server is flooded with requests so it can’t cope with real demand (either shuts down or stops responding to all requests), DDoS is when multiple computers are used to flood the traffic (harder to stop)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is data interception and theft?

A

Whenever data travels across a network, it is split into packets which can be intercepted, read, altered, or deleted, either by someone hijacking the network and pretending to be the packet’s destination, or using packet sniffing software and hardware to monitor network traffic (usually used to find passwords)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is social engineering?

A

Techniques designed to trick people into giving away important data or passwords

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are some examples of social engineering scams?

A

Pretexting: impersonating a trusted source (e.g. police officer, bank clerk)
Phishing: sending an email/text, pretending to be a reputable source, with a link to enter personal information
Tailgating: looking over someone’s shoulder to see their PIN/password

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is poor network policy and what are some examples?

A

Poor network policy doesn’t prevent users from doing harmful things so the network and its users are at risk
Examples of good policy: Users shouldn’t access accounts they don’t have authorisation to; users shouldn’t view illegal, defamatory, or pornographic content; users shouldn’t download files without knowing the source; users shouldn’t click links on emails without knowing their source

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is penetration testing?

A

When a company hires somebody to try and break into their system to identify weaknesses and confirm security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is network forensics?

A

The process of monitoring and analysing network traffic to see who is performing suspicious actions (and may be source of past or future attacks)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

How can network policies protect users?

A

Having rules that users have to agree to before using a network (often including not installing software, not looking at inappropriate content, and not creating malware) prevents some harmful actors from using the network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is anti-malware software?

A

Protection software that stays in the computers memory and constantly scans drives and memory for malicious software, comparing suspicious items with a database of known threats and reporting any matches (user can then choose to quarantine or delete file)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is a firewall?

A

A network security system that scans files as they come into your system from a network or the internet, flagging anything suspicious (can be set to block certain files or file types)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are user access levels?

A

Users can have only partial access to a system (e.g. pupil in a school not accessing same files as teacher)

17
Q

How can passwords protect users?

A

Strong passwords can protect against brute force attacks (longer, more complex = better)

18
Q

What is encryption?

A

Data can be scrambled before transmission on a network so it can’t be read if intercepted as criminals shouldn’t have access to the secret encryption key

19
Q

What is input sanitisation?

A

Removing malicious code from data entered into a form on a webpage, including removing any special characters and using ‘prepared statements’ that convert strings into correct SQL statements