3.2 Network Security Flashcards

1
Q

Describe how usernames and passwords secure a network.

A

Each user is given a unique username. They can decide on a password which only they will know. The username and password must be entered when the user logs on to use the network. When being entered, the password is kept secret by appearing in asterisk or dot format. The software on the file server then checks that a username with the password entered exists. This stops unauthorised users from accessing the network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Give 4 good properties of a password.

A
  • Combination of letters, numbers and other characters
  • Minimum number of characters
  • Changed regularly
  • Kept confidential.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Give 3 bad properties of a password.

A
  • The same as your username, pet’s name or family name
  • A word
  • Written down anywhere.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Describe how levels of access work.

A

Each group of users has a different level of access, meaning they are limited to the amount of data they can access or the actions they can carry out. This protects the network from damage by users.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Define encryption.

A

A way of encoding data before transmitting it on a netwotk. Data is encoded by the sending computer using a software encoding key and sent along the communications line. The data can only be decoded by the receiving computer is it has the decodig key. This keeps data secure whilst it is being transmitted between computers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Define virus.

A

A computer program which is designed to damage some aspect of an information system. They generally need to attach themselves to a document or program so that they can infect the computer. They can enter a network through the internet, by email, or from a portable storage device like a flash memory stick.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is a worm?

A

A virus designed to spread by replicating itself, and does not have to be attached to any document or program. This can cause problems on a network as the worm will slow down processing whilst reproducing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is a Trojan horse?

A

A virus that gains entry to a user’s computer ‘in disguise’.The user may think it is a useful program, but instead it provides hackers with an entry point to the user’s computer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

How can virus attacks be prevented?

A

The computer system can install virus protection software which automatically updates itself to take account of any new viruses. It scans all of the linked computers each day to ensure there are no infections. Likewise any portable storage devices entered are scanned to ensure it is virus-free. If a virus is detected, the user and system administrator will be notified.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Define spam.

A

The bulk sending of electronic messages to people who have not requested it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Define spyware.

A

Malicious software (malware) which is secretly installed on a user’s computer. It collects information about the user such as their visited websites. It can also allow other programs to be installed, change the computer settings, or even monitor keystrokes to capture passwords.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Describe a firewall.

A

A firewall can be integrated into a hardware device or software program. It filters information coming from the internet to the computer network. This prevents hackers, viruses and spam from entering the network via the internet, and users within the network from uploading data onto the internet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Why is data backup important?

A

To ensure there is a copy of data that can be loaded onto the system if the original data is lost.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Describe 2 types of hard disk backup.

A
  • Networked-Attached Storage (NAS) devices - This is a hard disk storage system which is connected to the network through a network point. It is not part of the main server. When a bacup is scheduled, all of the files from the file server are copied onto the NAS. A NAS device can share data with other servers and devices on the network.
  • Direct-Attached Storage (DAS) devices - This is a hard disk storage system which is connected directly to the main computer in the network. Backups are scheduled and all the data on the sever is copied to the DAS. A DAS device cannot be accessed through other network devices.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Describe magnetic tape as a method of backup.

A

The tape is stored in the tape drive on the file server and a backup of the system is taken at regular intervals. Backup activity may slow the network down because it uses sytem resources, so it is usually done when the computer system is not busy, eg. during the night.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are the problems with backing up data online?

A
  • If the company is unreliable the data may not be held securely.
  • Some companies hold sensitive data and it may not be acceptable to store it on the internet.