4) Network Security Flashcards

You may prefer our related Brainscape-certified flashcards:
1
Q

What is malware?

A

A software that can harm devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What does malware do?

A
  • delete or modify files
  • scareware make them beleive theres viruses
  • locking files
  • Spy ware
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

How do malware access your device?

A
  • viruses attactch to certain devices
  • worms (soread really quickly and exploit weaknessnes)
  • Trojans (malware disguised)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is people at the weakpoint?

A

Catfishing people for information saying there a big company

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is phishing?

A

Criminals send emails or texts pretending to be a big company. They then say to update all details and all their details are gone

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A way you can spot phishing?

A

Poor grammar

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Whats a brute force attack?

A

Type of attack to gain information by cracking passwords through trial and error. Eg use an automated software to produce likely combinations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is penitrating testing?

A

An organisation uses employes to stimulate attacks on their network
Find the weak point of a network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is anti maleware software?

A

Designed to find and stop maleware damaging a network and devices on it. Companies use firewalls to prevent it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Whats physical security?

A

Protects the physical parts of the network.
Eg locks and cameras

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are user access levels?

A

Control which parts of the network different groups can access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are passwords?

A

Help unathorised users access the network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is a virus?

A
  • It can replicate istelf and spread from system to system by attaching itself to infected files
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

When is a virus activated?

A

When opened by a human

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is a worm?

A

Replicate itself and spread system from system to system by findjng weakness of a system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Whats a worm?

A

Replictaes itself and spread from system to sysetm by finding weakness in system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Whats a trojan?

A

A harmful program that looks real so users are tricked to install it

18
Q

What is spyware?

A

Secretley records the activities of the user on a computer. Main aim is to record usernames,passwords and credit card information

19
Q

What is a keylogger?

A

Secretly records the key presses of a user on a computer. Data is stored and sent back. Main aim is to record usernames and credit card information

20
Q

What is Ransomware?

A
  • Locks files on a computer using encryption so they can no longer use them
  • Demand money for them to unlock (btc)
21
Q

What is SQL injection?

A
  • Programing langauge to manipulate data in databases
  • It can trick the website into giving unauthorised access.
  • Can view and edit the contents of the database
22
Q

How is SQL injection used?

A

Malicious SQL query is entered into a data input box on a website

23
Q

Whats a DOS attack?

A
  • A computer repeatedly sends requests to a server to overload a system. It will make the server offline
24
Q

What is a Brute force attack?

A
  • Every combination is tested from start to finish. Not quick but can break password eventually and sped up with multiple computer systems
25
Q

What is social engineering?

A
  • Trick others into revealing their personal data by posing a trusted source
  • eg. IT asking for password
26
Q

What is Interception?

A
  • Data packets are intercepted by a third party and copied to a different location.
  • Packet sniffers are used to intercept and analyse data packets
27
Q

Whats the purpose of a penetration test?

A

To find any risks or weaknesses and fix them

28
Q

What are the 4 main type of penetration tests?

A
  • Internal tests (see how much damage is done within the company)
  • External tests (infiltrate a system from outside a company)
  • Blind tests (no inside information and see what a real hacker would do)
  • Targeted tests (are by an IT department to find the faults in a system)
29
Q

What is anti-malware software?

A

Used to locate and delete malware, like viruses,

30
Q

How does the anti-malware software do it?

A
  • Scans each file on the computer and compares it against a database of a known malware.
31
Q

What are other roles of an anti-malware software?

A
  • Checking all emails that come in and go out
  • Checking files as they are downloaded
  • Scanning viruses on hard drive
32
Q

Whats a firewall?

A
  • Manages incoming and outgoing network traffic
33
Q

What does a firewall do?

A
  • Data packet is processed to check wether it should be given access by the network.
  • Unexpected data packets will be filtered out and not accepted
34
Q

Other roles of a firewall?

A
  • Blocking access to insecure websites
  • Blocking programes from accessing the internet
  • Blocking unauthorised downloads
35
Q

Whats a secure password?

A
  • Secure password to minimise risk of users accessing
36
Q

Whats read only access?

A
  • User can only view file and not change data
37
Q

What is encryption?

A
  • Process of scrambaling data into an unreadable format so attackers cannot understand if intercepted.
38
Q

How is encryption used?

A
  • Plaintext is converted to scrambled ciphertext using an encryption key.
39
Q

What is physical security?

A
  • A lock can be used to prevent access to a server room or locations that store confidential data.
40
Q

What are forms of physical security?

A
  • Biometric
  • keycards
  • CCTV
  • Alarms
  • Staff